Why did the IP spoof feature fail to prevent the spoofed packets from being forwarded?

A company’s security policy does not allow outside computers or smart phones into their work
areas. All company-provided computers are strictly controlled using 802.1X authentication on all of
their switches. All computers obtain DHCP IP addresses from centralized servers and all switches
have IP spoofing enabled. However, one of the computers was able to send IP spoofed packets.
Why did the IP spoof feature fail to prevent the spoofed packets from being forwarded?

A company’s security policy does not allow outside computers or smart phones into their work
areas. All company-provided computers are strictly controlled using 802.1X authentication on all of
their switches. All computers obtain DHCP IP addresses from centralized servers and all switches
have IP spoofing enabled. However, one of the computers was able to send IP spoofed packets.
Why did the IP spoof feature fail to prevent the spoofed packets from being forwarded?

A.
The IP source guard database timeout was set too low.

B.
The DHCP snooping feature was not enabled on any of the switches.

C.
IP source guard does not prevent IP spoof attacks; you need to configure the Dynamic ARP
Inspection feature.

D.
802.1X feature was not enabled on the port that was directly connected to the infected
computer.



Leave a Reply 0

Your email address will not be published. Required fields are marked *