Module 08 - Sniffing Flashcards

(25 cards)

1
Q

In one of the following techniques, a non-broadcast ARP is sent to all the nodes in a network, and a node running in the promiscuous mode broadcasts a ping message on the network with the local IP address but a different MAC address. Which is this technique?

A) ARP method
B) ARP spoofing
C) ARP poisoning
D) Ping method

A

A) ARP method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following threats of ARP poisoning links multiple IP addresses with a single MAC address of a target host intended for different IP addresses and overloads it with a huge amount of traffic?

A) VoIP call tapping
B) DoS attack
C) Session hijacking
D) MITM attack

A

B) DoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following protocols is not vulnerable to sniffing?

A) Post office protocol (POP)
B) Telnet and Rlogin
C) Secure sockets layer (SSL)
D) Hypertext transfer protocol (HTTP)

A

C) Secure sockets layer (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network administrator wants to configure port security on a Cisco switch. Which of the following commands helps the administrator to enable port security on an interface?

A) switchport port-security
B) switchport port-security maximum 1
C) switchport port-security aging type inactivity
D) switchport port-security aging time 2

A

A) switchport port-security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sniffers work at which of the following open systems interconnect (OSI) layers?

A) data link layer
B) presentation layer
C) transport layer
D) application layer

A

A) data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following countermeasures should be followed to defend against sniffing?

A) use dynamic IP addresses and ARP tables
B) allow SSID broadcasting
C) turn on network identification broadcasts
D) use HTTPS to protect usernames and passwords

A

D) use HTTPS to protect usernames and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following security measures should be followed to defend against DNS spoofing?

A) allow DNS requests being sent to external servers
B) avoid using DNS non-existent (NXDOMAIN) rate limiting
C) do not restrict DNS zone transfers to a limited set of IP addresses
D) restrict the DNS recusing service, either fully or partially, to authorized users

A

D) restrict the DNS recusing service, either fully or partially, to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following IOS Global commands is used to configure the number of DHCP packets per second (pps) that an interface can receive?

A) show ip dhcp snooping
B) ip dhcp snooping limit rate
C) ip dhcp snooping
D) ip dhcp snooping trust

A

B) ip dhcp snooping limit rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A hacker, who posed as a heating and air conditioning specialist, was able to install a sniffer program in a switched environment network. Which attack could have been used by the hacker to sniff all of the packets in the network?

A) MAC flood attack
B) fraggle attack
C) teardrop attack
D) smurf attack

A

A) MAC flood attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A tester wants to securely encrypt the session to prevent the network against a sniffing attack. Which of the following protocols should he use as a replacement of Telnet?

A) Load balancing (LB)
B) SSH
C) Public key infrastructure (PKI)
D) Intrusion prevention system (IPS)

A

B) SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following display filters in Wireshark is used by an attacker to perform filtering by multiple IP addresses?

A) ip.addr == 10.0.0.4 or ip.addr == 10.0.05
B) tcp.analysis. retransmission
C) ip.addr==192.168.1.100 && tcp.port=23
D) ip.src != xxx.xxx.xxx.xxx && ip.dst != xxx.xxx.xxx.xxx && sip

A

A) ip.addr == 10.0.0.4 or ip.addr == 10.0.05

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following techniques is used by an attacker to connect a rogue switch to the network by tricking a legitimate switch and thereby creating a trunk link between them?

A. switch spoofing
B. double tagging
C. switch port stealing
D. IRDP spoofing

A

A. switch spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following measures should NOT be followed to prevent DNS spoofing attacks?

A) Implement an intrusion detection system (IDS) and deploy it correctly
B) allow outgoing traffic to use UDP port 53 as a default source port
C) secure internal machines
D) maintain a single or specific range of IP addresses to login to the systems

A

B) allow outgoing traffic to use UDP port 53 as a default source port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following techniques is also a type of network protocol for PNAC that is used to defend against MAC address spoofing and to enforce access control at the point where a user joins the network?

A) IEEE 802.1X suites
B) DHCP snooping binding table
C) IP source guard
D) Dynamic ARP inspection

A

A) IEEE 802.1X suites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following IPv4 DHCP packet fields includes a random number chosen by a client to associate requests messages and their responses between the client and server?

A) SNAME
B) Flags
C) Transaction ID (XID)
D) Opcode

A

C) Transaction ID (XID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following tools can a tester use to detect system that runs in promiscuous mode, which in turns helps to detect sniffers installed on the network?

A. FaceNiff
B. Nmap
C. OmniPeek
D. shARP

17
Q

Which of the following techniques is used by attackers to compromise the security of network switches that connect network segments and force a switch to act as a hub to sniff the traffic easily?

A. ARP spoofing
B. Switch spoofing
C. Wiretapping
D. MAC flooding

A

D. MAC flooding

18
Q

Which of the following fields in an IPv4 DHCP message has a size of 128 octets?

A. Hardware address length
B. Gateway IP address (GIADDR)
C. Server name (SNAME)
D. File name

19
Q

Which of the following tools helps an attacker capture all the data transmitted over a network and perform expert analysis of each part of the target network?

A) ike-scan
B. OmniPeek
C. DerpNSpoof
D. Spoof-Me-Now

20
Q

Which of the following protocols allows a user’s workstation to access mail from a mailbox server and send mail from the workstation to the mailbox server via SMTP?

A. SMTP
B. FTP
C. HTTP
D. POP

21
Q

Which of the following protocols is used to communicate through port 23 and allows an attacker to login to a network machine remotely via a TCP connection to sniff keystrokes, including usernames and passwords, that are sent in cleartext?

A. HTTP
B. NNTP
C. POP
D. Telnet

22
Q

Ross, an attacker, targeted an organization’s network to sniff the DNS traffic. For this purpose, he used a DNS poisoning tool that can create a list of fake DNS records and load it while running to redirect a target employee to a malicious website. Which of the following tools did Ross employ in the above scenario?

A. WIBR+
B. Suricata
C. Reaver
D. DerpNSpoof

A

D. DerpNSpoof

23
Q

Which of the following techniques is an active wiretapping attack that allows an attacker to monitor and record traffic as well as alter or inject data into the communication or traffic?

A. Spying
B. MITM
C. Eavesdropping
D. Snooping

24
Q

Cyrus, a professional hacker, performed an ARP poisoning attack on a target network by using an automated tool. The tool used by Cyrus sends fake ARP messages to divert all communications between two machines so that all traffic is redirected through his machine. Which of the following tools did Cyrus employ in the above scenario?

A. Nexpose
B. OpenVAS
C. Nikto
D. dsniff

25
Which of the following is a defense technique for MAC spoofing used in switches that restricts the IP traffic on untrusted Layer 2 ports by filtering traffic based on the DHCP snooping binding database? A. DHCP snooping binding table B. Authentication, authorization, and accounting (AAA) C. Dynamic ARP inspection D. IP Source Guard
D. IP Source Guard