Sniffing Flashcards
In which of the following OSI layers do sniffers operate and perform an initial compromise?
Network layer
Physical layer
Transport layer
Data link layer
Data link layer
Out of the following, which layer is responsible for encoding and decoding data packets into bits?
Data link layer
Network layer
Application layer
Session layer
Data link layer
An attacker wants to monitor a target network traffic on one or more ports on the switch. In such a case, which of the following methods can he use?
Active sniffing
Lawful interception
Port mirroring
Wiretapping
Port mirroring
Sniffers work at which of the following open systems interconnect (OSI) layers?
Transport layer
Presentation layer
Application layer
Data link layer
Data link layer
Which of the following fields in an IPv4 DHCP message has a size of 128 octets?
Gateway IP address (GIADDR)
File name
Server name (SNAME)
Hardware address length
File name
Which IOS Global command is used to configure the number of DHCP packets per second (pps) that an interface can receive
ip dhcp snooping limit rate
Which technique is used by an attacker to connect a rogue switch to the network by tricking a legitimate switch and thereby creating a trunk link between them?
Switch spoofing
How should you defend against MAC spoofing?
IP Source Guard
What is a DHCP Snooping Binding Table?
The DHCP snooping process filters untrusted DHCP messages and helps to build and bind a DHCP binding table. This table contains the MAC address, IP address, lease time, binding type, VLAN number, and interface information to correspond with untrusted interfaces of a switch. It acts as a firewall between untrusted hosts and DHCP servers. It also helps in differentiating between trusted and untrusted interfaces.
What is Dynamic Arp Inspection?
Dynamic arp inspection checks the IP–MAC address binding for each ARP packet in a network. While performing a DAI, the system will automatically drop invalid IP–MAC address bindings
What is IP Source Guard?
IP Source Guard is a security feature in switches that restricts the IP traffic on untrusted layer 2 ports by filtering traffic based on the DHCP snooping binding database. It prevents spoofing attacks when the attacker tries to spoof or use the IP address of another host
What are the IEEE 802.1X suites
This is a type of network protocol for port-based Network Access Control (PNAC), and its main purpose is to enforce access control at the point where a user joins the network.
Which of the following DHCPv6 messages is sent by a server to a client in response to DHCPDiscover with the offer of configuration parameters?
Release
Reply
Relay-Reply
Advertise
Advertise
Which IOS global command verifies the DHCP snooping configuration?
show ip dhcp snooping
In which attack does an attacker send spoofed router advertisement messages so that all the data packets travel through their system to collect valuable information and launch MITM and DoS attacks?
IRDP (ICMP router discovery protocol) spoofing