PrepAway - Latest Free Exam Questions & Answers

Which of the following should be implemented to ensure that a malicious insider will not be able to successful

A security administrator must implement a network that is immune to ARP spoofing attacks. Which of the
following should be implemented to ensure that a malicious insider will not be able to successfully use
ARP spoofing techniques?

PrepAway - Latest Free Exam Questions & Answers

A.
UDP

B.
IPv6

C.
IPSec

D.
VPN

Explanation:
ARP is not used in IPv6 networks.
The Address Resolution Protocol (ARP) is a telecommunication protocol used for resolution of network
layer addresses into link layer addresses, a critical function in multiple-access networks. ARP is used for
converting a network address (e.g. an IPv4 address) to a physical address like an Ethernet address (also
named a MAC address).
In Internet Protocol Version 6 (IPv6) networks, the functionality of ARP is provided by the Neighbor
Discovery Protocol (NDP).
Incorrect Answers:
A: UDP (User Datagram Protocol) can be used over IPv6. However, it is more commonly used over IPv4
which relies on ARP and is therefore susceptible to ARP spoofing attacks.
C: IPSec (IP Security) can be used to secure IPv6. However, it is more commonly used to secure IPv4 which
relies on ARP and is therefore susceptible to ARP spoofing attacks.
D: A VPN (Virtual Private Network) can be created over IPv6. However, VPNs are more commonly used in
IPv4 which relies on ARP and is therefore susceptible to ARP spoofing attacks.

https://en.wikipedia.org/wiki/Address_Resolution_Protocol


Leave a Reply