exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 577 discussion

Actual exam question from Cisco's 350-701
Question #: 577
Topic #: 1
[All 350-701 Questions]

Which common threat can be prevented by implementing port security on switch ports?

  • A. VLAN hopping attacks
  • B. spoofing attacks
  • C. denial-of-service attacks
  • D. eavesdropping attacks
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ton99
6 months ago
Its B, reference from Omar Santos Guide: Port security limits the number of MAC addresses learned on a port and "protects against malicious applications that may send thousands of frames into the network, each with a different bogus MAC address" to exhaust the switch’s MAC address table
upvoted 2 times
...
houhou12322
6 months, 2 weeks ago
"This also protects against malicious applications that may be sending thousands of frames into the network, with a different bogus MAC address for each frame, as the user tries to exhaust the limits of the dynamic MAC address table on the switch, which might cause the switch to forward all frames to all ports within a VLAN so that the attacker can begin to sniff all packets. This is referred to as a CAM table overflow attack. Content-addressable memory (CAM) is a fancy way to refer to the MAC address table on the switch. Port security also prevents the client from depleting DHCP server resources, which could have been done by sending thousands of DHCP requests, each using a different source MAC address. DHCP spoofing attacks take place when devices purposely attempt to generate enough DHCP requests to exhaust the number of IP addresses allocated to a DHCP pool." it's B or D. i think DHCP spoofing is more dangerous. I'm in favor of B
upvoted 1 times
...
Happy_Shepherd26
6 months, 2 weeks ago
Selected Answer: D
A. Incorrect : a vlan hopping attack is prevented by not using vlan 1 as the default vlan and configure the user facing ports as access ports. Port security not needed here. B. Incorrect : port-security will not verify if the mac addresses it sees are spoofed or not (this is Dynamic ARP Inspection job). C. Incorrect : although an attacker can send big amount of data to clog the port it is connected to to its maximum bandwidth, the other ports will still work correctly. D. Correct : by sending multiple frames with different mac addresses, the attacker can fill the mac adress table to its maximum capacity. The switch won't be able to register mac addresses of legitimate traffic and will treat legitimate traffic as unknown unicast traffic and flood it just like broadcast traffic. The attacker will then be able to eavesdrop.
upvoted 3 times
...
Surfside92
6 months, 3 weeks ago
Selected Answer: A
Port security won't stop spoofing. The allowed mac address on a port can be spoofed by an attacker and the switch will allow access. However if an attacker is on a particular vlan they wont be able to 'hop' to a different vlan as the ports in question will have port security and only allowed specific mac addresses.
upvoted 1 times
...
Bubu3k
9 months, 4 weeks ago
Selected Answer: D
In my opinion it should be B, butt this is what the OCG books says: "Sniffing or eavesdropping: An attacker is listening in on the network traffic of others. This could be done in a switched environment, where the attacker has implemented a content-addressable memory (CAM) table overflow, causing the switch to forward all frames to all other ports in the same VLAN. To protect against this, you can use switch port security on the switches to limit the MAC addresses that could be injected on any single port. In general, if traffic is encrypted as it is transported across the network, either natively or by a VPN, that is a good countermeasure against eavesdropping."
upvoted 2 times
...
Rododendron2
11 months, 3 weeks ago
Selected Answer: C
port-security = mac address limit, nothing else
upvoted 2 times
...
CCNPWILL
1 year, 6 months ago
Selected Answer: B
Spoofing is correct.
upvoted 2 times
...
smprr2
1 year, 7 months ago
Selected Answer: B
spoofing attack
upvoted 1 times
...
itemba36
1 year, 10 months ago
Selected Answer: B
I think the answer should be B: spoofing attack
upvoted 2 times
...
ums008
1 year, 10 months ago
Selected Answer: B
I think this should be B: Spoofing attacks
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago