41.
On a switch, each switchport represents a ____________.
- A.VLAN
- B.Broadcast domain
- C.Host
- D.Collision domain
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Each switchport represents a collision domain, thereby limiting sniffing to only the clients residing on that port. |
42.
Wireless access points function as a ____________.
- A.Hub
- B.Bridge
- C.Router
- D.Repeater
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
All wireless access points are essentially hubs in that they do not segregate traffic the way a traditional wired switch does. |
43.
What mode must be configured to allow an NIC to capture all traffic on the wire?
- A.Extended mode
- B.10/100
- C.Monitor mode
- D.Promiscuous mode
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
An NIC must be configured to operate in promiscuous mode to capture all traffic on the network. More specifically, it allows the interface to capture both traffic that is intended for the host and traffic that is intended for other clients. |
44.
Which of the following prevents ARP poisoning?
- A.ARP Ghost
- B.IP DHCP Snooping
- C.IP Snoop
- D.DNSverf
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
IP DHCP Snooping can be used on Cisco devices to prevent ARP poisoning by validating IP-to-MAC mappings based on a saved database. |
45.
Jennifer is a system administrator who is researching a technology that will secure
network traffic from potential sniffing by unauthorized machines. Jennifer is not
concerned with the future impact on legitimate troubleshooting. What technology can
Jennifer implement?
- A.SNMP
- B.LDAP
- C.SSH
- D.FTP
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Jennifer can implement a form of encryption for the traffic that she wants to protect from sniffing. Secure Shell traffic would not be readable if captured by a sniffer; however, any legitimate network troubleshooting efforts would also prove more challenging because of packet encryption. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40