Which recommendation, if followed, would mitigate this type of attack?

Refer to the exhibit. An attacker is connected to interface Fa0/11 on switch A-SW2 and attempts to establish a DHCP server for a man-in-middle attack. Which recommendation, if followed, would mitigate this type of attack?

Select the best response.

Refer to the exhibit. An attacker is connected to interface Fa0/11 on switch A-SW2 and attempts to establish a DHCP server for a man-in-middle attack. Which recommendation, if followed, would mitigate this type of attack?

Select the best response.

A.
All switch ports in the Building Access block should be configured as DHCP trusted ports.

B.
All switch ports in the Building Access block should be configured as DHCP untrusted ports.

C.
All switch ports connecting to hosts in the Building Access block should be configured as
DHCP trusted ports.

D.
All switch ports connecting to hosts in the Building Access block should be configured as DHCP untrusted ports.

E.
All switch ports in the Server Farm block should be configured as DHCP untrusted ports.

F.
All switch ports connecting to servers in the Server Farm block should be configured as DHCP untrusted ports.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Peter

Peter

Why not A?

And if there is a port used for phones? Why would you trust that user?

Peter

Peter

Got it! The uplink should be trusted.