Refer to the exhibit. What type of attack is being defended against?
A.
snooping attack
B.
rogue device attack
C.
STP attack
D.
VLAN attack
E.
spoofing attack
F.
MAC flooding attack
Explanation:
When DHCP snooping is configured, you can display its status with the following command:
Switch#show ip dhcp snooping [binding]
You can use the binding keyword to display all the known DHCP bindings that have been
overheard. The switch maintains these in its own database.
A switch can use the DHCP snooping bindings to prevent IP and MAC address spoofing
attacks. MAC spoofing attacks consist of malicious clients generating traffic by using MAC
addresses that do not belong to them. IP spoofing attacks are exactly like MAC spoofing
attacks, except that the client uses an IP address that isn’t his.
LAN Switch Security: What Hackers Know About Your Switches, by Eric Vyncke
– CCIE No. 2659; Christopher Paggen – CCIE No. 2659, Cisco Press, Chapter 5.