READ Free Dumps For Cisco- 640-554
Question ID 22149 | Which action best describes a MAC address spoofing attack? |
Option A | altering the MAC address of an attacking host to match that of a legitimate host |
Option B | bombarding a switch with fake source MAC addresses |
Option C | forcing the election of a rogue root bridge |
Option D | flooding the LAN with excessive traffic |
Correct Answer | A |
Question ID 22150 | When configuring a site-to-site IPsec VPN using the CLI, the authentication pre-share command is configured |
Option A | Configure the message encryption algorithm with the encryption type ISAKMP policy configuration |
Option B | Configure the DH group identifier with the groupnumber ISAKMP policy configuration command |
Option C | Configure a hostname with the crypto isakmp identity hostname global configuration command |
Option D | Configure a PSK with the crypto isakmp key global configuration command |
Correct Answer | D |