Chapter 9 Quiz Flashcards

1
Q

Which method used to detect sniffing works by sending a pulse down the wire, which it then uses to create a graph, and compares to previous responses?

A

TDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which ARP poisoning tools can be used to sniff and analyze traffic generated by SSH?

A

Cain and Abel

Ettercap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of network and method can be used for a sniffer to capture all network trafic?

A

Switched Ethernet, ARP spoofing
Switched Ethernet, MAC flooding
Shared Ethernet, Passive sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which ARP poisoning technique targets network switches with excessive traffic, which causes them to change to hub mode, during which they become too busy to enforce port security features?

A

MAC Flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a tool that can be used for lawful intercept, which is fully integrated with Wireshark, and uses elements called Views to allow administrators to analyze and visualize the network?

A

SteelCentral Packet Analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is another way that all network traffic can be captured in a switched network?

A

Port mirroring, Switched Port Analyzer, Port monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What protocols are most vulnerable to sniffing

A

HTTP, Telnet, SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the DNS poisoning techniques involves an attacker using a Trojan to change the victim’s DNS server IP address to that of the attackers machine?

A

Internet DNS spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When using Snort to capture packets, which switch is used to specify which class of network packets has to be captured by IP address.

A

-h

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which method used to detech sniffing can identify a system operating in promiscuous mode by using a nonbroadcast IP address request?

A

ARP method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly