How is a reflector port used in an RSPAN configuration?It provides a dedicated connection for the IDS device.It allows an RSPAN session to be backward compatible with a SPAN session.It acts like a loopback interface in that it reflects the captured traffic to the RSPAN VLAN.It allows an IDS device to direct malicious traffic to it, isolating that traffic from other areas of the network.
Which attack is mitigated by using port security?LAN stormVLAN hoppingSTP manipulationMAC address table overflow
With IP voice systems on data networks, which two types of attacks target VoIP specifically? (Choose two.)CoWPAttyKismetSPITvirusvishing
As a recommended practice for Layer 2 security, how should VLAN 1 be treated?All access ports should be assigned to VLAN 1.All trunk ports should be assigned to VLAN 1.VLAN 1 should be used for management traffic.VLAN 1 should not be used.
An administrator wants to prevent a rogue Layer 2 device from intercepting traffic from multiple VLANs on a network. Which two actionshelp mitigate this type of activity? (Choose two.)Disable DTP on ports that require trunking.Place unused active ports in an unused VLAN.Secure the native VLAN, VLAN 1, with encryption.Set the native VLAN on the trunk ports to an unused VLAN.Turn off trunking on all trunk ports and manually configure each VLAN as required on each port.
How many Cisco Security Agent clients can one Management Center for CSA console support?1,00010,000100,0001,000,000
Which option best describes a MAC address spoofing attack?