Network Attacks & Mitigations Flashcards

1
Q

Man in the Middle

A

ARP poisoning can enable an attacker to become the man in the middle & intercept traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DoS

A

By poisoning ARP tables, an attacker can perform a DoS by creating false traffic routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spoofing Identity

A

An attacker can use ARP poisoning to hide in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to prevent ARP poisoning

A
  • Identify duplicate MAC address
  • Check for Suspicious ARP traffic
  • User Static ARP entries
  • Configure Port security
  • use encrypted protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Yersenia

A

Framework for creating network attacks
exploits network protocols vulnerabilities
comes with ready-made attacks against multiple protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Shutdown (default mode)

A

The port shuts down automatically and notification is sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Restrict

A

Drops frames with unfamiliar source MAC addresses and sends a notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protect

A

frames with unknown source MAC addresses are dropped with no notification sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Manual

A

Most secure method

requires manual configuration of each allowed MA per interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sticky

A

MACS are learned dynamically and limited to a maximum number per interface
(port security 1 & 3072)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VLAN Hopping

A

The attacker bypasses switch restrictions and intercepts traffic from various VLANs
two common methods, Switch Spoofing & Double Tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly