Sniffing Flashcards

1
Q

In which of the following OSI layers do sniffers operate and perform an initial compromise?

Network layer
Physical layer
Transport layer
Data link layer

A

Data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Out of the following, which layer is responsible for encoding and decoding data packets into bits?

Data link layer
Network layer
Application layer
Session layer

A

Data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An attacker wants to monitor a target network traffic on one or more ports on the switch. In such a case, which of the following methods can he use?

Active sniffing
Lawful interception
Port mirroring
Wiretapping

A

Port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sniffers work at which of the following open systems interconnect (OSI) layers?

Transport layer
Presentation layer
Application layer
Data link layer

A

Data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following fields in an IPv4 DHCP message has a size of 128 octets?

Gateway IP address (GIADDR)
File name
Server name (SNAME)
Hardware address length

A

File name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which IOS Global command is used to configure the number of DHCP packets per second (pps) that an interface can receive

A

ip dhcp snooping limit rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which technique is used by an attacker to connect a rogue switch to the network by tricking a legitimate switch and thereby creating a trunk link between them?

A

Switch spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How should you defend against MAC spoofing?

A

IP Source Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a DHCP Snooping Binding Table?

A

The DHCP snooping process filters untrusted DHCP messages and helps to build and bind a DHCP binding table. This table contains the MAC address, IP address, lease time, binding type, VLAN number, and interface information to correspond with untrusted interfaces of a switch. It acts as a firewall between untrusted hosts and DHCP servers. It also helps in differentiating between trusted and untrusted interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Dynamic Arp Inspection?

A

Dynamic arp inspection checks the IP–MAC address binding for each ARP packet in a network. While performing a DAI, the system will automatically drop invalid IP–MAC address bindings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IP Source Guard?

A

IP Source Guard is a security feature in switches that restricts the IP traffic on untrusted layer 2 ports by filtering traffic based on the DHCP snooping binding database. It prevents spoofing attacks when the attacker tries to spoof or use the IP address of another host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the IEEE 802.1X suites

A

This is a type of network protocol for port-based Network Access Control (PNAC), and its main purpose is to enforce access control at the point where a user joins the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following DHCPv6 messages is sent by a server to a client in response to DHCPDiscover with the offer of configuration parameters?

Release
Reply
Relay-Reply
Advertise

A

Advertise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which IOS global command verifies the DHCP snooping configuration?

A

show ip dhcp snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In which attack does an attacker send spoofed router advertisement messages so that all the data packets travel through their system to collect valuable information and launch MITM and DoS attacks?

A

IRDP (ICMP router discovery protocol) spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A tester is attempting to capture and analyze the traffic on a given network and realizes that the network has several switches. What could be used to successfully sniff the traffic on this switched network? (Choose three.)

  • Address resolution protocol (ARP) spoofing
  • ARP broadcasting
  • MAC duplication
  • Reverse smurf attack
  • SYN flooding
  • MAC flooding
A

MAC flooding, MAC duplication and ARP spoofing

17
Q

Which of the command is used to set the maximum number of secure MAC addresses for the interface on a Cisco switch

A

switchport port-security maximum 1 vlan access

18
Q

A network administrator wants to configure port security on a Cisco switch. Which command helps the administrator to enable port security on an interface?

A

switchport port-security

19
Q

Which Cisco IOS global command is used to enable or disable DHCP snooping on one or more VLANs

A

ip dhcp snooping vlan 4,104

20
Q

What is BetterCAP?

A

Bettercap is an ARP poisoning tool and also it is the Swiss Army knife for WiFi, Bluetooth Low Energy, wireless HID hijacking and Ethernet networks reconnaissance and MITM attacks

21
Q

What is svmap?

A

Svmap is an open-source scanner that identifies SIP devices and PBX servers on a target network. It can be helpful for system administrators when used as a network inventory tool

22
Q

What is DNSRecon?

A

DNSRecon is a zone enumeration tool that assists users in enumerating DNS records such as A, AAAA, and CNAME. It also performs NSEC zone enumeration to obtain DNS record files of a target domain

23
Q

What is Enyx?

A

Enyx is an enumeration tool that fetches the IPv6 address of a machine through SNMP.

24
Q

Which of the following Cisco switch port configuration commands is used to enter a secure MAC address for the interface and the maximum number of secure MAC addresses?

switchport port-security maximum value
switchport port-security mac-address mac_address
switchport port-security limit rate invalid-source-mac
switchport port-security mac-address sticky

A

switchport port-security mac-address mac_address

25
Q

Which of the following techniques enables devices to detect the existence of unidirectional links and disable the affected interfaces in the network, in addition to causing STP topology loops?

Root guard
​Loop guard
UDLD
BPDU guard

A

UDLD (Unidirectional Link Detection)

26
Q

Which of the following IOS switch commands is used to drop packets with unknown source addresses until a sufficient number of secure MAC addresses are removed?
switchport port-security violation restrict
switchport port-security aging type inactivity
switchport port-security
switchport port-security mac-address sticky

A

switchport port-security violation restrict

27
Q

What is ARP spoofing?

A

ARP spoofing is a method of attacking an Ethernet LAN. When a legitimate user initiates a session with another user in the same layer 2 broadcast domain, the switch broadcasts an ARP request using the recipient’s IP address, while the sender waits for the recipient to respond with a MAC address.

28
Q

What is ARP poisoning?

A

With the help of ARP poisoning, an attacker can use fake ARP messages to divert all communications between two machines so that all traffic redirects via the attacker’s PC.

29
Q

What is ARP method of promiscuous node detection?

A

This technique sends a non-broadcast ARP to all the nodes in the network. The node that runs in promiscuous mode on the network WILL CACHE that info in the arp table (non-promiscuous nodes do not). Then, it will broadcast a ping message on the network with the local IP address but a different MAC address. In this case, only the node that has the MAC address (cached earlier) will be able to respond to your broadcast ping request

30
Q

What is the Ping method of promiscuous node detection?

A

Send a ping request to the suspect machine with its IP address and an incorrect MAC address. If the machine replies, it’s in promiscuous mode.