Testout 13.8.5 Practice Questions

6 September 2022
4.7 (114 reviews)
18 test answers

Unlock all answers in this set

Unlock answers (14)
question
Which of the following attacks tries to associate an incorrect mac address with a known IP address?
answer
ARP poisoning
question
ARP spoofing/poisoning associates the attacker's MAC address with the IP address of
answer
victim devices.
question
When computers send an ARP request to get the MAC address of a known IP address, the attacker's system responds with
answer
its MAC address.
question
MAC flooding
answer
overloads the switch's MAC forwarding table to make the switch function like a hub. The attacker floods the switch with packets, each containing difference source MAC addresses. The flood of packets fills up the forwarding table and consumes so much of the memory in the switch that it causes the switch to enter a state called failopen mode, in which all incoming packets are broadcast out all ports (as with a hub) instead of just to the correct ports, as per normal operation.
question
A null session is
answer
the ability to log on using a blank username and password.
question
In a hijacking attack
answer
an attacker steals an open session, inserting himself into the session in place of the original client.
question
Which of the following best describes the ping of death exploit?
answer
An ICMP packet larger than 65536 bytes
question
A ping of death exploit uses
answer
an ICMP packet that is larger than 65,536 bytes.
question
A teardrop attack uses
answer
partial IP packets iwth overlapping sequencing numbers.
question
A smurf attack
answer
sends multiple spoofed ICMP packets to the victim.
question
The ability to re-direct echo responses is a feature of
answer
ICMP that is often involved in malicious attacks.
question
Which exploit seeks to maliciously re-associate the IP address of a legitimate network host with the MAC address of the attackers computer?
answer
ARP poisoning
question
ARP spoofing uses spoofed ARP messages to associate a
answer
different MAC address with an IP address.
question
ARP spoofing can be used to perform
answer
a man-in-the-middle attack.
question
IP spoofing changes the
answer
IP address information within a packet.
question
As the victim of a Smurf attack, what protection measure is the most effective during the attack?
answer
Communicating with your upstream provider
question
The most effective protection measure the victim of a Smurf attack can perform during an attack is to
answer
communicate with upstream providers.
question
You have just purchased a new network device and are getting ready to connect it to your network. Which of the following should you do to increase its security? (2)
answer
Change default account passwords / Apply all patches and updates