Which type of sniffing technique is generally referred as MiTM attack?
Which of the following tool accomplishes this?
When Jason moves a file via NFS over the company’s network, you want to grab a copy of it by
sniffing. Which of the following tool accomplishes this?
What happens when the CAM table becomes full?
Switches maintain a CAM Table that maps individual MAC addresses on the network to physical
ports on the switch.
In MAC flooding attack, a switch is fed with many Ethernet frames, each containing different
source MAC addresses, by the attacker. Switches have a limited memory for mapping various
MAC addresses to physical ports. What happens when the CAM table becomes full?
Which of the following is not considered to be a part of active sniffing?
Which of the following is not considered to be a part of active sniffing?
What is Peter Smith talking about?
You went to great lengths to install all the necessary technologies to prevent hacking attacks,
such as expensive firewalls, antivirus software, anti-spam systems and intrusion
detection/prevention tools in your company’s network. You have configured the most secure
policies and tightened every device on your network. You are confident that hackers will never be
able to gain access to your network with complex security system in place. Your peer, Peter Smith
who works at the same department disagrees with you. He says even the best network security
technologies cannot prevent hackers gaining access to the network because of presence of
“weakest link” in the security chain. What is Peter Smith talking about?
ARP poisoning is achieved in _____ steps
ARP poisoning is achieved in _____ steps
How does a denial-of-service attack work?
How does a denial-of-service attack work?
How would you describe a simple yet very effective mechanism for sending and receiving unauthorized informatio
How would you describe a simple yet very effective mechanism for sending and receiving
unauthorized information or data between machines without alerting any firewalls and IDS’s on a
network?
What filter will you apply?
How would you proceed?
You are trying to break into a highly classified top-secret mainframe computer with highest security
system in place at Merclyn Barley Bank located in Los Angeles. You know that conventional
hacking doesn’t work in this case, because organizations such as banks are generally tight and
secure when it comes to protecting their systems. In other words you are trying to penetrate an
otherwise impenetrable system. How would you proceed?