What are the primary attack methods of VLAN hopping?

What are the primary attack methods of VLAN hopping? (Choose two.)

What are the primary attack methods of VLAN hopping? (Choose two.)

A.
VoIP hopping

B.
Switch spoofing

C.
CAM-table overflow

D.
Double tagging



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Johanna Konig

Johanna Konig

Hello, 22th/11/2017 New 210-260 Exam Questions:

QUESTION
Which FirePOWER preprocessor engine is used to prevent SYN attacks?

A. Anomaly.
B. Rate-Based Prevention
C. Portscan Detection
D. Inline Normalization

Answer: B

QUESTION
What is the only permitted operation for processing multicast traffic on zone-based firewalls?

A. Stateful inspection of multicast traffic is supported only for the self-zone.
B. Stateful inspection of multicast traffic is supported only between the self-zone and the internal zone.
C. Only control plane policing can protect the control plane against multicast traffic.
D. Stateful inspection of multicast traffic is supported only for the internal zone

Answer: C
Explanation:

QUESTION
Which of encryption technology has the broadcast platform support to protect operating systems?

A. Middleware
B. Hardware
C. software
D. file-level

Answer: C

QUESTION
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?

A. holistic understanding of threats
B. graymail management and filtering
C. signature-based IPS
D. contextual analysis

Answer: D

QUESTION
Which Sourfire secure action should you choose if you want to block only malicious traffic from a particular end-user?

A. Trust
B. Block
C. Allow without inspection
D. Monitor
E. Allow with inspection

Answer: E
Explanation:

QUESTION
Which two next-generation encryption algorithms does Cisco recommends? (Choose two)

A. SHA-384
B. MD5
C. DH-1024
D. DES
E. AES
F. 3DES

Answer: AE
Explanation:

QUESTION
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?

A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device PIN or password before proceeding with the operation
C. It immediately erases all data on the device.
D. It notifies the device user and proceeds with the erase operation

Answer: A

QUESTION
How does a device on a network using ISE receive its digital certificate during the new-device registration process?

A. ISE acts as a SCEP proxy to enable the device to receive a certificate from a central CA server
B. The device request a new certificate directly from a central CA
C. ISE issues a pre-defined certificate from a local database
D. ISE issues a certificate from its internal CA server.

Answer: A
Explanation:

More: https://drive.google.com/drive/folders/0B75b5xYLjSSNV1RGaFJYZkxGWFk?usp=sharing