10.3.4 Check Your Understanding – Layer 2 Security Threats Answers

1. Which of the following mitigation techniques are used to protect Layer 3 through Layer 7 of the OSI Model? (Choose three.)

  • DHCP snooping
  • VPN
  • Firewalls
  • IPSG
  • IPS devices

Explanation: VPNs, firewalls, and IP devices are examples of Layer 3 through Layer 7 mitigation techniques. DHCP snooping and IPSG are used to mitigate Layer 2 attacks.

2. Which of the following mitigation techniques prevents many types of attacks including MAC address table overflow and DHCP starvation attacks?

  • IPSG
  • DHCP snooping
  • DAI
  • Port security

Explanation: Port security prevents many types of attacks including MAC address table overflow and DHCP starvation attacks.

3. Which of the following mitigation techniques prevents MAC and IP address spoofing?

  • IPSG
  • DHCP snooping
  • DAI
  • Port security

Explanation: IPSG prevents MAC and IP address spoofing.

4. Which of the following mitigation techniques prevents ARP spoofing and ARP poisoning attacks?

  • IPSG
  • DHCP snooping
  • DAI
  • Port security

Explanation: DAI prevents ARP spoofing and ARP poisoning attacks.

5. Which of the following mitigation techniques prevents DHCP starvation and DHCP spoofing attacks?

  • IPSG
  • DHCP snooping
  • DAI
  • Port security

Explanation: DHCP snooping prevents DHCP starvation and DHCP spoofing attacks.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x