Remote control malware was found on a client device, and an unknown attacker was manipulating the network from afar. The attack resulted in the network switches reverting to flooding mode, thereby enabling the attacker to eavesdrop on a significant portion of network communications. After reviewing IDS and traffic logs, you determine that this was accomplished by an attack utility which generated a constant Ethernet frames with random source MAC addresses. What can be done to prevent this attack from occurring in the future?
A Restrict access to DHCP.
B Use a static HOSTS file.
C Use MAC limiting on the switch ports.
D Implement an ARP monitor.
Answer: C Use MAC limiting on the switch ports.
You might also like to view...
What is the value of the expression that follows?
``` strcmp(“dog”, “dogs”); ``` a. -1 b. 0 c. 1 d. ‘s’ e. none of the above
What will the output look like?
``` int main( ) { int x = 10; if(x > 5) { if( x == 7) { cout<<”x is 7”; } else { cout<<”x is not 7”; } } else { cout<<”x is not > 5”; } return 0; } ``` A. x is not > 5 B. x is not 7 C. x is 7x is not 7 D. Nothing. The statement is written incorrectly.
In what kind of recovery does the DBMS use the log to undo any changes made to a database during a certain period?
A. backward B. restorative C. undo D. model
Case Based Critical ThinkingCase 1Brett is working on a logo for his tropical fish shop, The Aquarium Emporium. He wants the first letter of each word to have a wavy, underwater look. Which of the following filter groups might give Brett the "underwater" look he is going for?
A. Distort B. Fresco C. Glass D. Emboss