In the use of 802.1X access control,
which three protocols are allowed through the switch port before authentication takes place? ()
A. STP
B. CDP
C. EAP MD5
D. TACACS+
E. EAP-over-LAN
F. protocols not filtered by an ACL
您可能感興趣的試卷
你可能感興趣的試題
The DAI feature has been implemented in the Company switched LAN.
Which three statements are true about the dynamic ARP inspection (DAI) feature? ()
A. DAI can be performed on ingress ports only.
B. DAI can be performed on both ingress and egress ports.
C. DAI is supported on access ports, trunk ports, EtherChannel ports, and private VLAN ports.
D. DAI should be enabled on the root switch for particular VLANs only in order to secure the ARP caches of hosts in the domain.
E. DAI should be configured on all access switch ports as untrusted and on all switch ports connected to other switches as trusted.
F. DAI is supported on access and trunk ports only.
pany has implemented 802.1X authentication as a security enhancement.
Which statement is true about 802.1x port-based authentication?()
A. TACACS+ is the only supported authentication server type.
B. If a host initiates the authentication process and does not receive a response, it assumes it is not authorized.
C. RADIUS is the only supported authentication server type.
D. Before transmitting data, an 802.1x host must determine the authorization state of the switch.
E. Hosts are required to havea 802.1x authentication client or utilize PPPoE.
F. None of the other alternatives apply.
Refer to the exhibit.
How will interface FastEthernnet0/1 respond when an 802.1x-enabled client connects to the port? ()
A. The switch will uniquely authorize the client by using the client MAC address.
B. The switch will cause the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate.
C. The switch port will disable 802.1x port-based authentication and cause the port to transition to the authorized state without any further authentication exchange.
D. The switch port will enable 802.1x port-based authentication and begin relaying authentication messages between the client and the authentication server.
An attacker is launching a DoS attack on the Company network using a hacking tool designed to exhaust the IP address space available from the DHCP servers for a period of time.
Which procedure would best defend against this type of attack? ()
A. Configure only trusted interfaces with root guard.
B. Implement private VLANs (PVLANs) to carry only user traffic.
C. Implement private VLANs (PVLANs) to carry only DHCP traffic.
D. Configure only untrusted interfaces with root guard.
E. Configure DHCP spoofing on all ports that connect untrusted clients.
F. Configure DHCP snooping only on ports that connect trusted DHCP servers.
G. None of the other alternatives apply
The Company is concerned about Layer 2 security threats.
Which statement is true about these threats? ()
A. MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.
B. Port scanners are the most effective defense against dynamic ARP inspection.
C. MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable attack points.
D. Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks.
E. DHCP snooping sends unauthorized replies to DHCP queries.
F. ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.
G. None of the other alternatives apply.
最新試題
Which router redundancy protocol cannot be configured for interface tracking?()
Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()
How are STP timers and state transitions affected when a topology change occurs in an STP environment?()
Refer to the exhibit. For what purpose is the command show ip cef used?()
Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()
DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()
Which statement is correct about the use of the virtual interface on a WLC ?()
Which two statements about the various implementations of STP are true?()
Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()
Which statement is correct about RSTP port roles?()