Lab 3-3˸ Network Vulnerabilities Part 1
Packet sniffing can be helpful in detecting rogues. True False
False It is technically possible to detect rogues by using wireless sniffing tools to capture information regarding access points within range. Packet sniffing can be helpful in detecting rogues.
Which of the following is NOT a means used by an attacker to do reconnaissance on a network? Smurf attack Port scan attack DNS footprinting Christmas tree attack TCP/IP Stack fingerprinting Banner grabbing
Smurf attack
What attack involves impersonating another device? Spimming Pharming Spoofing Spearing Phishing
Spoofing Spoofing involves impersonating another device or user for launching attack. A popular way to achieve this is through creating IP packets using someone else's IP address.
What can be deployed to intercept and log network traffic passing through the network? event viewers NIDSs protocol analyzers proxy catchers NIPSs
protocol analyzers Packet sniffers are protocol analyzers that can be deployed to intercept and log network traffic passing through the network.
