Chapter 9 Quiz Flashcards
Which method used to detect sniffing works by sending a pulse down the wire, which it then uses to create a graph, and compares to previous responses?
TDR
Which ARP poisoning tools can be used to sniff and analyze traffic generated by SSH?
Cain and Abel
Ettercap
What type of network and method can be used for a sniffer to capture all network trafic?
Switched Ethernet, ARP spoofing
Switched Ethernet, MAC flooding
Shared Ethernet, Passive sniffing
Which ARP poisoning technique targets network switches with excessive traffic, which causes them to change to hub mode, during which they become too busy to enforce port security features?
MAC Flooding
Which of the following is a tool that can be used for lawful intercept, which is fully integrated with Wireshark, and uses elements called Views to allow administrators to analyze and visualize the network?
SteelCentral Packet Analyzer
What is another way that all network traffic can be captured in a switched network?
Port mirroring, Switched Port Analyzer, Port monitoring
What protocols are most vulnerable to sniffing
HTTP, Telnet, SNMP
Which of the DNS poisoning techniques involves an attacker using a Trojan to change the victim’s DNS server IP address to that of the attackers machine?
Internet DNS spoofing
When using Snort to capture packets, which switch is used to specify which class of network packets has to be captured by IP address.
-h
Which method used to detech sniffing can identify a system operating in promiscuous mode by using a nonbroadcast IP address request?
ARP method