12.6.14 Practice Questions
Which of the following describes an on-path attack?
A false server intercepts communications from a client by impersonating the intended server.
Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on the network?
ARP poisoning
Which of the following attacks can also be used to perform denial of service (DoS) attacks?
ARP spoofing
What is spoofing?
Changing or falsifying information in order to mislead or re-direct traffic.
Which of the following is the MOST effective protection against IP packet spoofing on a private network?
Ingress and egress filters
Which of the following attack types consists of capturing packets as they travel from one host to another with the intent of altering the contents?
On-path
Your network administrator is configuring settings so the switch shuts down a port when the max number of MAC addresses is reached. What is the network administrator taking countermeasures against?
Sniffing
A router on the border of your network detects a packet with a source address from an internal client, but the packet was received on the internet-facing interface. Which attack form is this an example of?
Spoofing
Which type of activity changes or falsifies information in order to mislead or re-direct traffic?
Spoofing
Using sniffers has become one way for an attacker to view and gather network traffic. If an attacker overcomes your defenses and obtains network traffic, which of the following is the BEST countermeasure for securing the captured network traffic?
Use encryption for all sensitive traffic.