Home
You may like this!
41.
On a switch, each switchport represents a ____________.
  • A.
    VLAN
  • B.
    Broadcast domain
  • C.
    Host
  • D.
    Collision domain
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Each switchport represents a collision domain, thereby limiting sniffing to only the clients residing on that port.
Report
Name Email  
42.
Wireless access points function as a ____________.
  • A.
    Hub
  • B.
    Bridge
  • C.
    Router
  • D.
    Repeater
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
All wireless access points are essentially hubs in that they do not segregate traffic the way a traditional wired switch does.
Report
Name Email  
43.
What mode must be configured to allow an NIC to capture all traffic on the wire?
  • A.
    Extended mode
  • B.
    10/100
  • C.
    Monitor mode
  • D.
    Promiscuous mode
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
An NIC must be configured to operate in promiscuous mode to capture all traffic on the network. More specifically, it allows the interface to capture both traffic that is intended for the host and traffic that is intended for other clients.
Report
Name Email  
44.
Which of the following prevents ARP poisoning?
  • A.
    ARP Ghost
  • B.
    IP DHCP Snooping
  • C.
    IP Snoop
  • D.
    DNSverf
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
IP DHCP Snooping can be used on Cisco devices to prevent ARP poisoning by validating IP-to-MAC mappings based on a saved database.
Report
Name Email  
45.
Jennifer is a system administrator who is researching a technology that will secure network traffic from potential sniffing by unauthorized machines. Jennifer is not concerned with the future impact on legitimate troubleshooting. What technology can Jennifer implement?
  • A.
    SNMP
  • B.
    LDAP
  • C.
    SSH
  • D.
    FTP
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Jennifer can implement a form of encryption for the traffic that she wants to protect from sniffing. Secure Shell traffic would not be readable if captured by a sniffer; however, any legitimate network troubleshooting efforts would also prove more challenging because of packet encryption.
Report
Name Email