READ Free Dumps For Cisco- 010-151
Question ID 6451 | From which of the following attacks can Message Authentication Code (MAC) shield your network?
|
Option A | DoS
|
Option B | DDoS
|
Option C | spoofing
|
Option D | SYN floods
|
Correct Answer | c |
Explanation Message Authentication Code (MAC) can shield your network from spoofing attacks. Spoofing, also known as masquerading, is a popular trick in whichan attacker intercepts a network packet, replaces the source address of the packets header with the address of the authorized host, and reinserts fake information which is sent to the receiver. This type of attack involves modifying packet contents. MAC can prevent this type of attack and ensure dataintegrity by ensuring that no data has changed. MAC also protects against frequency analysis, sequence manipulation, and ciphertext-only attacks. MAC is a secure message digest that requires a secret key shared by the sender and receiver, making it impossible for sniffers to change both the data and the MAC as the receiver can detect the changes.A denial-of-service (DoS) attack floods the target system with unwanted requests, causing the loss of service to users. One form of this attack generatesa flood of packets requesting a TCP connection with the target, tying up all resources and making the target unable to service other requests. MAC doesnot prevent DoS attacks. Stateful packet filtering is the most common defense against a DoS attack.
Question ID 11647 | Which Cisco NX-OS command displays kernel uptime?
|
Option A | show module
|
Option B | show version
|
Option C | show license
|
Option D | show boot
|
Option E | show interface
|
Correct Answer | B |
Explanation