找考题网-背景图
多项选择题

Which two statements about a wireless repeater topology are true?()

A.A wireless repeater is an access point that is not connected to the wired LAN.
B.The repeater feature is only available in lightweight access point topologies.
C.The SSID of the root access point must be configured on the repeater access point.
D.This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.
E.This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.
F.To avoid interference, the repeater access point must use a different channel from what the root access point uses.

热门试题

单项选择题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()

A.The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
B.Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
C.The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
D.The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
E.The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
F.Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
G.None of the other alternatives apply