exam questions

Exam 200-301 All Questions

View all questions & answers for the 200-301 exam

Exam 200-301 topic 1 question 970 discussion

Actual exam question from Cisco's 200-301
Question #: 970
Topic #: 1
[All 200-301 Questions]

DRAG DROP
-

Drag and drop the attack-mitigation techniques from the left onto the types of attack that they mitigate on the right.

Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
oatmealturkey
Highly Voted 2 years, 4 months ago
MAC flooding attack ----> Configure 802.1x MITM spoofing attack (read: rogue DHCP server) -----> Configure DHCP snooping
upvoted 41 times
JulesAZ
1 year, 4 months ago
Thank goodness for all the community in this paid for area. So close to the end just a few hundred to go. I reckon overall its worth it just to have had sight to close to 'real' exam questions. The fact that for large parts we have to 'research' helps in itself. Though where even with community input we cant agree an answer, thats generally because the question is nonsense..... Thanks :)
upvoted 6 times
...
...
JJY888
Highly Voted 2 years, 3 months ago
I think the answers are corect.
upvoted 13 times
Shabeth
1 year, 11 months ago
i agree, the answers are correct
upvoted 1 times
...
...
matass_md
Most Recent 10 months, 3 weeks ago
Given answers are correct : MITM Attacks: 802.1X enforces mutual authentication to eliminate the potential of man-in-the-middle (MITM) attacks. When the client establishes the connection to the network, the access point triggers a certificate exchange to authenticate its identity. DHCP Snooping alone does not help us limit the rate of MAC addresses learned, but DAI works with DHCP snooping , of course port security would have been a better answer for this to limit the number of MAC addresses learned via one port but in this scenario this is what we have . Double tagging - change native VLAN Vlan Hopping - deactivate DTP
upvoted 1 times
...
tumajay
1 year ago
Given answers are correct. Even the next question 971 ask the option that is vulnerable to MIDM attack and answer is telnet and what do you use to avoid the vulnerability? ssh which is authentication.
upvoted 2 times
...
[Removed]
1 year, 2 months ago
given answers are incorrect 802.1q double-tagging VLAN-hopping attack = configure the native VLAN with a nondefault VLAN ID MAC flooding attack = configure 802.1x authenticate man-in-the-middle spoofing attack = configure DHCP snooping switch-spoofing VLAN-hopping attack = disable DTP see question number 623 as well
upvoted 7 times
...
PaddyInNZ
1 year, 6 months ago
This question is not sane. The model answers are correct, except for the technique to mitigate against MAC flooding attack. Whilst 802.1x is all that's left, this will not work. The correct answer would be to use port security and limit the number of MACs allowed.
upvoted 1 times
...
no_blink404
1 year, 11 months ago
Provided answer is correct. https://www.securew2.com/blog/preventing-man-in-the-middle-mitm-attacks-the-ultimate-guide
upvoted 1 times
...
MassNastty1
2 years ago
oatmeal turkey is correct: MITM Attacks - DHCP Snooping MAC Flooding - 802.1X Authentication 802.1Q Double Tagged VLAN Hopping Attacks - Change Native VLAN To non-default VLAN Switch Spoofing VLAN Hopping - Disable DTP (Set Switchport to Nonnegotiate)
upvoted 8 times
MassNastty1
2 years ago
i mean incorrect lol
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...