单项选择题
A、...uses VTP to collect VLAN information that is sent out and then tags itself with the domain information in order to capture the data.
B、...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a VLAN that would be inaccessible to the attacker through legitimate means.
C、...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the trunk.
D、...tags itself with all usable VLANs to capture data that is passed through the switch, regardless of the VLAN to which the data belongs.
E、None of the other alternatives apply
单项选择题 You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()
单项选择题 Refer to the exhibit. An attacker is connected to interface Fa0/11 on switch A-SW2 and attempts to establish a DHCP server for a man-in-middle attack. Which recommendation, if followed, would mitigate this type of attack?()
多项选择题 Refer to the exhibit. On the basis of the output generated by the show commands, which two statements are true?()