You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()
A . The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
B . Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
C . The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
D . The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
E . The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
F . Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
G . None of the other alternatives apply
相似题目
-
An administrator trying to restore a backup from tape encounters read errors. The administrator suspects that it could be an issue with the block device. What is the appropriate method to resolve this issue?()
A . Set the block size to 0.
B . Read the tape using the tctl command.
C . Use the 'cpio' command to override tape device settings.
D . Run the 'dd' command to identify the block size from the tape.
-
While inspecting the main bearings on a diesel engine you find impregnated dirt and scratches in the bearing surface you would, therefore, suspect that ()
A . the bearing had been overheated
B . water was present in the oil
C . the lube oil was not being properly filtered
D . the maximum allowable bearing pressure had been exceeded
-
A diesel engines crankcase oil level is found to be too high√ You should suspect that ().
A . the engine was over filled
B . there might be a fuel leak
C . there might be a water leak
D . all of the above
-
You are implementing a Web page that displays text that was typed by a user. You need to display the user input in the Web page so that a cross-site scripting attack will be prevented. What should you do?()
A . Call document.write.
B . Call Response.Write.
C . Call HttpUtility.UrlEncode.
D . Call HttpUtility.HtmlEncode.
-
If an auxiliary diesel engine temperature is higher than normal ,but the thermostat is determined not to be defective you would suspect a /an ()
A . cavitation erosion in the water jackets
B . excess corrosion inhibitor in the coolant
C . dirty jacket water cooler
D . defective turbocharger
-
You have a computer that runs Windows 7. You need to view the processes that currently generate network activity. What should you do? ()
A . Open Resource Monitor and click the Network tab.
B . Open Windows Task Manager and click the Networking tab.
C . Open Event Viewer and examine the NetworkProfile Operational log.
D . Open Performance Monitor and add all the counters for network interface.
-
If you suspect a diesel engine is misfiring due to air leakage into the fuel system, you should begin looking for the leak at the ()
A . fuel line connections to cylinder injection valves
B . gasket surfaces of the fuel oil filters
C . discharge fitting of the fuel injector pumps
D . suction side of the fuel oil tra
-
A system administrator suspects that there were problems with the AIX installation on a pSeries server. Which of the following commands can be used, with the appropriate flags, to view the BOS installation output files?()
A . alog
B . errpt
C . lscfg
D . install
-
If a diesel engine is difficult to start and operates with the engine temperatures lower than normal, you should suspect that the ().
A . compression pressures are below normal
B . lube oil is diluted with fuel oil
C . cranking speed is too low
D . exhaust system is partially restricted
-
You have a computer that runs Windows 7. You need to view the processes that currently generate networkactivity. What should you do?()
A . Open Resource Monitor and click the Network tab.
B . Open Windows Task Manager and click the Networking tab.
C . Open Event Viewer and examine the NetworkProfile Operational log.
D . Open Performance Monitor and add all the counters for network interface.
-
You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with your protocol stack. Which of the following actions is most likely to confirm your diagnosis?()
A . ping 127.0.0.0
B . ping 203.125.12.1
C . telnet 127.0.0.1
D . ping 127.0.0.1
E . tracert 203.125.12.1
-
Some diesel engines are fitted with a thermometer in the cooling water outlet from each cylinderIf the cooling water temperature from all cylinders begins to rise above normal, you should suspect ()
A . increase blow-by in all cylinders
B . incomplete combustion in all cylinder
C . overloading in all cylinders
D . insufficient fuel delivery to all cylinder
-
An administrator trying to restore a backup from tape encounters read errors. The administrator suspects that it could be an issue with the block device. What is the appropriate method to resolve this issue?()
A . Set the block size to 0.
B . Read the tape using the tctl command.
C . Use the ’cpio’ command to override tape device settings.
D . Run the ’dd’ command to identify the block size from the tape.
-
If you suspect that the illness might be serious, you should not ________ going to the doctor.
-
听力原文:W: This position means working abroad a lot. And that can be very lonely sometimes. Would you say that you are a patient person?
M: I've never seen any point in losing my temper.
Q: What does the man mean?
(17)
A.He is a short-tempered person.
B.It doesn't matter whether you have a good temper or bad temper.
C.He thinks himself to be a patient person.
D.He won't accept this position.
-
—That's a beautiful dress you have on —()
—That&39;s a beautiful dress you have on —()
A.Oh,thanks.I got it yesterday.
B.Sorry,it's too cheap.
C.You can have it.
D.See you later.
-
I'd like to remind you that there is no_____on the part of suspects to answer questions.
A. obligation
B.evidence
C.transaction
D.motivation
-
— Who do you suspect _____ having stolen the wallet?
— Hard to say.
A withB forC aboutD of
-
Do you think this is a nice place?()A.That's all right.B.You're well.C.No, it
Do you think this is a nice place?()
A.That's all right.
B.You're well.
C.No, it's not here.
D.Yes, I think so.
-
Rob is a 46 y.o. admitted to the hospital with a suspected diagnosis of Liver cirrhosis. He’s jaundiced and reports weakness. Which intervention will you include in his care?
A.Regularexercise
B.A low-protein diet.
C.Allow patient to select his meals.
D.Rest period after small, frequent meals.
-
Inappropriate attire for an interview make the interviewer suspect that you do not have good judgment as to what the right behavior. should be in a formal setting.
A.Right
B.Wrong
C.Not mentioned
-
I'd like to remind you that there is no _____ on the part of suspects to answer qu
A.A.transaction
B.B.obligation
C.C.motivation
D.D.evidence
-
An administrator trying to restore a backup from tape encounters read errors. The administrator suspects that it could be an issue with the block device.What is the appropriate method to resolve this issue?()
A.Set the block size to 0.
B.Read the tape using the tctl command.
C.Use the ‘cpio‘ command to override tape device settings.
D.Run the ‘dd‘ command to identify the block size from the tape.
-
We may ________ that hackers from outside of the company present a more serious threat
A.A.infer
B.B.refer
C.C.prefer
D.D.grant