Networking Review II Flashcards

1
Q

Explain in simple terms what is taking place in each of the three packets:

A
  • **A device is asking who the owner of 192.168.47.254 is.**
  • **A device responds “I am the owner, and here is my MAC address.”**
  • **Then, a malicious device says, “Actually, I am the owner, here is a new MAC address.”**
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of attack is this?

A

This is an ARP poisoning attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the MAC address of the good device?

A

00:50:56:f9:f5:54

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the MAC address of the hacker’s device?

A

00:0c:29:1d:b3:b1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What negative impact might this type of attack have?

A

Traffic can be routed to the hacker’s device instead of the correct, intended device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain in simple terms what is taking place

A

There are many DHCP requests requesting IP addresses from the DHCP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of attack is this?

A

DHCP starvation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is the destination IP 255.255.255.255 for all packets?

A

This is a broadcast IP, it is broadcasting the message across the whole local network to all devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What negative impact might this type of attack have?

A

The DHCP server could run out of IP addresses and not be able to issue IPs to new devices connecting on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain in simple terms what is taking place

A

There are many SYN requests. These are checking all the ports to see which are open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of attack is this?

A

SYN Scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is this type of activity always an attack? In other words, can a security professional benefit from what is taking place?

A

A security professional can use this same method to determine which ports are open in case they need to close them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What negative impact might this type of attack have?

A

A hacker could use this method to determine what ports exist, and which are open. Then the attacker could launch attacks against the open ports, as the ports can identify what services are potentially running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the different security types available for Wireless communications? List them in order from least to most secure.

A

WEP > WPA > WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is 802.11

A

Standards for wireless network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an SSID?

A

The service set identifier is the name of a wireless network

17
Q

What is the name of the signal a WAP sends out identifying its SSID?

A

Beacon

18
Q

If a user has WEP encrypted wireless, what is a potential negative outcome?

A

With WEP, an attacker could potentially find the decryption key from wireless traffic. The attacker could then use that key to decrypt the encrypted traffic.

19
Q

What could it mean if the SPF record fails?

A

The email is likely not legitimate