![]() (VLAN Access map with a “mac access list” can also be used to filter MAC). To protect against this type of attack, port security feature can be used to limit and allow specific MAC to access the port -> F is correct. The attacker can listen to these broadcast packets and capture sensitive data. ![]() Now the switch acts like a hub, in which all incoming packets are broadcast out on all ports instead of just to the correct destination port as normal operation. ![]() This makes the switch learn the MAC addresses until its memory is used up. MAC flooding attack is a technique in which the attacker floods the switch with packets, each containing different source MAC address. It is not used to mitigate MAC address flooding attacks -> C is not correct.ĭAI should be used to mitigate ARP Spoofing attack in which the attacker fakes its MAC as the destination MAC to receive traffic intended for valid destination -> E is not correct. PVLAN is often used to protect devices on a common VLAN, give them more separation even though they are on the same VLAN. Root guard is used to mitigate Spanning-tree compromises, not ARP address spoofing -> A and D are not correct.ĭHCP spoofing is mitigated by DHCP snooping -> B is not correct.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |