A system is overwhelmed by a flood of ICMP echo requests, causing a denial of service. Another attack sends oversized packets that crash older systems. What two ICMP-based attacks are being described?
ICMP Flood (DoS) and Ping of Death; both exploit ICMP’s simplicity to disrupt service.
What secure protocol suite is commonly used in VPNs to authenticate and encrypt data packets across IP networks?
IPsec – Internet Protocol Security, which creates encrypted communication paths by securing data at the network layer.
What are the key differences between Packet Filtering, Stateful, and Next-Generation Firewalls in terms of traffic inspection?
Packet Filtering Firewall:
Inspects headers only (IP, port, protocol
Stateless; rule-based filtering
Stateful Firewall:
Tracks session state and connection context
Allows return traffic from valid sessions
Next-Generation Firewall (NGFW):
Performs Deep Packet Inspection (DPI)
App-aware; can filter by user, content, and behavior
While analyzing LAN traffic, an engineer sees a packet with destination MAC 01:00:5E:00:00:FB. What type of traffic is this?
Multicast traffic—MAC addresses starting with 01:00:5E indicate IPv4 multicast packets sent to a group of device
A network administrator is deciding between split tunnel, full tunnel, peer-to-peer VPN, and site-to-site VPN. He needs to support remote employees who require secure access to internal resources while minimizing bandwidth strain from general internet use. Explain each VPN type and choose the best option for his needs.
Split tunnel: Routes only internal traffic through the VPN
Full tunnel: Routes all traffic through the VPN
Peer-to-peer: Direct user-to-user connection
Site-to-site: Links entire networks
Best option: Split tunnel—minimizes bandwidth strain while securing internal access
What are the weaknesses of WEP and why is it considered insecure?
Uses RC4 encryption, which is outdated and vulnerable. Relies on Initialization Vectors (IVs) that are short and reused—making it easy for attackers to reverse-engineer encryption keys.
What improvements did WPA introduce over WEP?
Added Message Integrity Check (MIC) to detect tampering and prevent on-path attacks. Introduced Enterprise Mode, which uses unique credentials per user and authenticates via a central server (e.g., RADIUS).
How does WPA2 enhance wireless security compared to WPA?
Replaces RC4 with AES (Advanced Encryption Standard) for stronger encryption. Uses CCMP for both encryption and integrity—ensuring confidentiality and protection against tampering.
What are the vulnerabilities of Wi-Fi Protected Setup (WPS), and what is the recommended action?
WPS simplifies setup using a PIN or push-button, but the PIN method is highly vulnerable to brute-force attacks. Attackers can exploit predictable PIN structures to gain unauthorized access.
Best practice: Disable WPS on all access points to maintain strong network security.
How does SAE protect against brute-force attacks during Wi-Fi authentication?
Requires active interaction with the access point for each password attempt.
What is forward secrecy in WPA3, and how does SAE provide it?
SAE generates unique session keys for each connection—so previous traffic can’t be decrypted retroactively.
A WPA3 network uses a handshake that resists password guessing and ensures each session has a unique key. What protocol is in use?
SAE — the authentication method in WPA3 Personal.
Select all that apply to improve wireless security during router configuration:
A. Enable remote management over WAN
B. Disable WPS
C. Use WPA2 with a strong pre-shared key
D. Leave default SSID unchanged
E. Enable MAC address filtering
F. Use WEP for compatibility
G. Change default admin password
H. Disable SSID broadcast
I. Enable wireless isolation
J. Use WPA3 with SAE (if supported)
✅ Correct Answers:
B. Disable WPS
C. Use WPA2 with a strong pre-shared key
E. Enable MAC address filtering
G. Change default admin password
H. Disable SSID broadcast
I. Enable wireless isolation
J. Use WPA3 with SAE (if supported)
❌ Incorrect Answers & Why:
A. Enable remote management over WAN ❌ Increases attack surface—remote access should be disabled unless absolutely necessary and secured with strong authentication.
D. Leave default SSID unchanged ❌ Default SSIDs can reveal device make/model, making it easier for attackers to target known vulnerabilities.
F. Use WEP for compatibility ❌ WEP is deprecated and insecure due to weak encryption and IV vulnerabilities—never recommended.
What is Network Access Control (NAC)?
A security method that inspects devices before allowing network access to ensure they meet security requirements.
Which attack involves overwhelming a switch’s MAC address table to force it into broadcasting traffic like a hub?
MAC Flooding — overflows the MAC table, causing the switch to behave like a hub.
What types of controls fall under NAC?
MAC filtering, port security, 802.1X authentication, and posture checks (e.g., antivirus, patch compliance).
What is a Jumpbox, and what security measures should be taken?
A secure, intermediary server used to access devices in a screened subnet. Must be hardened, monitored, and restricted.
Which attack targets a single host by associating its MAC address with a legitimate IP to intercept traffic?
ARP Spoofing — manipulates ARP tables to redirect traffic.
Which ARP-based attack corrupts the ARP cache across an entire LAN?
ARP Poisoning — compromises ARP tables network-wide.
What type of attack targets DNS infrastructure to redirect traffic, steal data, or disrupt services?
DNS Attack — exploits DNS vulnerabilities for redirection or theft.
What is the term for using offensive techniques to retaliate against cyber attackers?
Hack Back — controversial due to legal and reputational risks.
What are two key IoT security best practices?
Segregation: Isolate IoT devices on a separate network
Security: Enable protections and apply patches regularly
How does Public Key Cryptography fit into the broader system of PKI?
PKI uses it for secure communication and includes certificate authorities, digital certificates, and key management.
What is a Wildcard Certificate, and when is it unsuitable?
What is a Wildcard Certificate, and when is it unsuitable?