exam questions

Exam 200-301 All Questions

View all questions & answers for the 200-301 exam

Exam 200-301 topic 1 question 623 discussion

Actual exam question from Cisco's 200-301
Question #: 623
Topic #: 1
[All 200-301 Questions]

DRAG DROP -
Drag and drop the attack-mitigation techniques from the left onto the types of attack that they mitigate on the right.
Select and Place:

Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
martco
Highly Voted 4 years, 2 months ago
change the default vlan id => prevents double tagging configure 802.1x authenticate => prevents MAC flooding enable DHCP Snooping => prevents MITM disable DTP => prevents switch spoofing
upvoted 77 times
matass_md
9 months ago
I'm sorry but you are wrong, the DHCP snooping will prevent the MAC flooding attacks if you recall when configuring DHCP snooping the untrusted ports ( access links that go to end devices have the command IP dhcp snooping limit-rate ) . Even I do understand the if we get a rouge DHCP server it can SPOOF DG , DNS and do a MITM attack) but 802.1x does take care of that asking users who want access to the network to provide valid credentials .
upvoted 1 times
...
aklas
1 year, 4 months ago
Wrong, the original answer is correct. DHCP snooping prevents MAC flooding starvation attack, 802.1x verifies endpoint identity and prevents MITM spoofing.
upvoted 3 times
[Removed]
10 months, 2 weeks ago
Jeremy's IT Lab explained. Rogue DHCP server modifies default GW on client. make client always send packets to the rogue server to other LAN
upvoted 1 times
...
...
vadiminski
3 years, 11 months ago
Absolutely correct
upvoted 2 times
...
dave1992
3 years, 6 months ago
wrong. DHCP snooping stops Rogue servers. Dynamic Arp inspection stops MITM attacks. 802.1x is to authenticate users and they dont get access until they authenticate.
upvoted 2 times
iGlitch
2 years, 10 months ago
Yeah but DHCP snooping needs to be configured for DAI to work.
upvoted 3 times
...
...
...
Gere
Highly Voted 4 years, 1 month ago
the correct answer should be: the 1st and 4th are correct but the 2nd and 3rd should be swapped.
upvoted 8 times
...
riteshm42
Most Recent 1 month, 3 weeks ago
Correct order 1. Configure the native VLAN with a nondefault VLAN ID 2. Configure 802.1x authenticate 3. Configure DHCP snooping 4. Disable DTP
upvoted 1 times
...
[Removed]
1 year, 1 month ago
given answer is wirong correct answers are the following: * 802.1q double-tagging VLAN-hopping attack = configure the native VLAN with a nondefault VLAN ID * MAC flooding attack = configure 802.1x authenticate * man-in-the-middle spoofing attack = configure DHCP snooping * switch-spoofing VLAN-hopping attack = disable DTP - We can prevent the MAC Flooding attack with various methods including configuration of IEEE 802.1X suites. - Man-in-the-Middle Attacks: In this type of attack, someone tries to intercept and modify the communication between two computers. This can be used to steal sensitive information or inject malicious code into communication. DHCP snooping can detect and prevent these kinds of attacks.
upvoted 3 times
Lse
3 months ago
given answer is correct, you need to double check yours MAC flooding attack = configure 802.1x authenticate think, before 802.1x authenticated, end user already established communication, its not stopping mac flooding. where having dhcp snooping enabled, a switch validate mac address against "DHCP Binding Table" that builds from trusted communication with dhcp server.
upvoted 1 times
...
...
Starlord2535
1 year, 1 month ago
How to prevent the MAC Flooding Attack? We can prevent the MAC Flooding attack with various methods. The following are some of these methods. 1) Port Security 2) Authentication with AAA server 3) Security measures to prevent ARP Spoofing or IP Spoofing 4) Implement IEEE 802.1X suites https://www.interserver.net/tips/kb/mac-flooding-prevent/
upvoted 1 times
Starlord2535
1 year, 1 month ago
To prevent MAC flooding attacks, network operators usually rely on the presence of one or more features in their network equipment: Implementations of IEEE 802.1X suites often allow packet filtering rules to be installed explicitly by an AAA server based on dynamically learned information about clients, including the MAC address. https://en.wikipedia.org/wiki/MAC_flooding
upvoted 1 times
...
...
picho707
1 year, 6 months ago
Here is the mapping of the attack mitigation techniques to the types of attacks: | Attack Type | Mitigation Technique | |---|---|---| | 802.1q double-tagging VLAN-hopping attack | Configure the native VLAN with a non-default VLAN ID | | MAC flooding attack | Configure DHCP snooping | | Man in The Middle attack | Configure 802.1X authenticate | | switch-spoofing VLAN-hopping attack | Disable DTP |
upvoted 2 times
...
dropspablo
1 year, 10 months ago
I think the original answer is correct. Despite the confusion that 802.1x and DHCP Snooping can mitigate MiTM, however 802.1x is generally considered the strongest and recommended feature for this attack as it provides TRUE individual authentication. https://garykongcybersecurity.medium.com/insecure-802-1x-port-based-authentication-using-eap-md5-c2b298bfc3ab And about MAC Flooding attack, the best way to mitigate it is with port-security, or with DHCP Snooping feature activated, limiting the reception rate, with commands: # ip dhcp snooping limit rate 10 #ip arp inspection limit rate 8 and about "802.1q double-tagging VLAN-hopping." If you use the default native Vlan 1 and the network is using the native vlan for another vlan, and there is traffic from native vlans (without tags) through the trunk ports, and the default native vlan would mistakenly receive this traffic from another native vlan (not default) used on the network.
upvoted 2 times
...
jorgenn
2 years, 10 months ago
Implementing IEEE 802.1X suites will allow packet filtering rules to be installed explicitly by an AAA server based on dynamically learned information about clients, including the MAC address. These are the methods often used to prevent the MAC Flooding attack.
upvoted 2 times
...
kentsing
2 years, 11 months ago
https://www.interserver.net/tips/kb/mac-flooding-prevent/ How to prevent the MAC Flooding Attack? We can prevent the MAC Flooding attack with various methods. The following are some of these methods. 1) Port Security 2) Authentication with AAA server 3) Security measures to prevent ARP Spoofing or IP Spoofing 4) Implement IEEE 802.1X suites 2nd & 3rd answer should be swapped, Mac flooding should be prevented by 802.1x implementation
upvoted 3 times
...
msomali
3 years ago
DHCP Snooping and 80.1x Authenticate are placed in the wrong Attacks, Need to be replaces, Admin Please change the Answers Refer to the links below for further understandings. https://www.interserver.net/tips/kb/mac-flooding-prevent/?__cf_chl_tk=HBU0WjmLQLFAbu4i57fVpxtcHbOHnpJti.oipqw.CyU-1649211364-0-gaNycGzNCJE http://solidsystemsllc.com/prevent-man-in-the-middle-attacks/ https://www.rapid7.com/fundamentals/man-in-the-middle-attacks/
upvoted 3 times
...
cybernett
4 years, 1 month ago
Check the source https://www.interserver.net/tips/kb/mac-flooding-prevent/ Mac flooding is overcome by 802.1X MITM attack is overcome by DHCP Snooping Please correct the answers @Admin
upvoted 8 times
...
sinear
4 years, 3 months ago
Not correct. Right answer is https://itexamanswers.net/question/drag-and-drop-the-attack-mitigation-techniques-from-the-left-onto-the-types-of-attack-that-they-mitigate-on-the-right
upvoted 5 times
LTTAM
4 years, 3 months ago
@sinear... that link actually gives the wrong answer. The solution posted here is correct.
upvoted 1 times
Littleowl
4 years, 2 months ago
technically dhcp snooping mitigates man in the middle attacks!
upvoted 1 times
Zerotime0
4 years, 2 months ago
Thats what i chose
upvoted 1 times
...
...
JamesDean_YouIdiots
3 years, 11 months ago
The answer posted to the website is wrong. 802.1x is for MAC flooding, and DHCP snooping is for MITM attacks. I just googled them both individually. Plus, that's what two other braindumps that I'm studying have as their correct answer, including the link that sinear posted.
upvoted 2 times
...
...
Ali526
4 years, 2 months ago
The first and the 4th are correct. 2nd and 3rd answers are wrong and need to be switched. Instead of reading answers on another exam web site, I prefer reading about the topic on sites that actually describe the issue.
upvoted 10 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago