Which recommendation, if followed, would mitigate this type of attack?

Refer to the exhibit

An attacker is connected to interface Fa0/11 on switch A-SW2 and attempts to establish a DHCP server for a
man-in-the-middle attack. Which recommendation, if followed, would mitigate this type of attack?

Refer to the exhibit

An attacker is connected to interface Fa0/11 on switch A-SW2 and attempts to establish a DHCP server for a
man-in-the-middle attack. Which recommendation, if followed, would mitigate this type of attack?

A.
All switch ports in the Building Access block should be configured as DHCP trusted ports

B.
All switch ports in the Building Access block should be configured as DHCP untrusted ports

C.
All switch pots connecting to host in the Building Access block should be configured as DHCP trustedports

D.
All switch pots connecting to host in the Building Access block should be configured as DHCP untrusted
ports

E.
All switch ports in the Server Farm block should be configured as DHCP untrusted ports

F.
All switch ports connecting to servers in the Server Farm block should be configured as DHCP untrusted
ports



Leave a Reply 0

Your email address will not be published. Required fields are marked *