Algebra and Trigonometry
9th EditionMichael Sullivan
10,535 solutions
College Algebra and Trigonometry
1st EditionDonna Gerken, Julie Miller
9,697 solutions
Trigonometry
8th EditionCharles P. McKeague, Mark D. Turner
3,737 solutions
Calculus with Analytic Geometry
7th EditionBruce H. Edwards, Larson, Robert P. Hostetler
10,461 solutions
Which of the following are characteristics of TACACS+? [Select two.]
-Uses UDP.
-Allows the possibility of two different servers, one for authentication and authorization, and another for accounting.
-Allows the possibility of three different servers, one each for authentication, authorization, and accounting.
-Uses TCP.
Which of the following are characteristics of TACACS+? [Select two.]
- Allows the possibility of two different servers, one for authentication and authorization, and another for accounting.
- Allows the possibility of three different servers, one for each authentication, authorization, and accounting.
- Uses TCP.
- Uses UDP.
ARP spoofing/poisoning
The source device sends frames to the attacker's MAC address instead of to the correct device.
Dynamic Trunking Protocol
Should be disabled on the switch's end user [access] ports before implementing the switch configuration into the network.
MAC flooding
Causes packets to fill up the forwarding table and consumes so much of the switch's memory that it enters a state called Fail Open Mode.
MAC spoofing
Can be used to hide the identity of the attacker's computer or impersonate another device on the network.
MAC flooding overloads the switch's MAC forwarding table to make the switch function like a hub.
> The attacker floods the switch with packets, each containing a different source MAC address.
> The flood of packets fills up the forwarding table and consumes so much of the memory in the switch that it causes the switch to enter into fail open mode. While in this mode, all incoming packets
are broadcast out of all ports [as with a hub] instead of just to the correct ports, as per normal operation.
> The attacker captures all the traffic with a protocol analyzer/sniffer.
ARP spoofing/poisoning associates the attacker's MAC address with the IP address of victim devices.
> When computers send an ARP request for the MAC address of a known IP address, the attacker's system responds with its own MAC address.
> The source device sends frames to the attacker's MAC
address instead of to the correct device.
> Switches are indirectly involved in the attack because they do not verify the MAC address/IP address association.
MAC spoofing changes the source MAC address on frames sent by the attacker.
> MAC spoofing is typically used to bypass 802.1x port-based security.
> MAC spoofing can be used to bypass wireless MAC filtering.
> MAC spoofing can be used to hide the identity of the attacker's computer or to impersonate another
device on the network.
> Dynamic Trunking Protocol [DTP] switches have the ability to automatically detect trunk ports and negotiate the trunking protocol used between devices. DTP is not secure and allows unauthorized devices to possibly modify configuration information. You should disable the DTP services on the switch's end user [access] ports before implementing the switch configuration into the network.
Recommended textbook solutions
Chemistry for Engineering Students
2nd EditionLawrence S. Brown, Thomas A. Holme
945 solutions
Vector Mechanics for Engineers: Dynamics
10th EditionE. Russell Johnston, Ferdinand Beer, Phillip Cornwell
1,411 solutions
Engineering Mechanics: Dynamics
2nd EditionFrancesco Costanzo, Gary L. Gray, Michael E. Plesha
229 solutions
Ingeniería de Control Moderna
5th EditionKatsuhiko Ogata
174 solutions