单项选择题
A.All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewable
B.Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patterns
C.All traffic is redirected to the VLAN that the attacker used to flood the CAM table
D.All traffic is flooded out all ports and an attacker is able to capture all data
E.None of the other alternatives apply
单项选择题 ThenetworkisbeingfloodedwithinvalidLayer2addresses,causingswitchCAMtablestobefilledandforcingunicasttraffictobetransmittedoutallswitchports.WhichtypeofLayer2attackisbeingusedhere?()
多项选择题 YouwanttoenhancethesecuritywithintheLANandpreventVLANhopping.Whattwostepscanbetakentohelppreventthis?()
单项选择题 Refer to the exhibit. Based upon the configuration, you need to understand why the policy routingmatch counts are not increasing. Which would be the first logical step to take?Select the bestresponse.()