10.4_MAC Address Table Attack Flashcards

1
Q

command used to show mac address table

A

show mac address-table dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False
Traffic is flooded only within the local LAN or VLAN. The threat actor can only capture traffic within the local LAN or VLAN to which the threat actor is connected.

A

True
When this occurs, the switch treats the frame as an unknown unicast and begins to flood all incoming traffic out all ports on the same VLAN without referencing the MAC table. This condition now allows a threat actor to capture all of the frames sent from one host to another on the local LAN or local VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If the threat actor stops ___ from running or is discovered and stopped, the switch eventually ages out the older MAC address entries from the table and begins to act like a switch again.

A

macof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To mitigate MAC address table overflow attacks, network administrators must implement ___.

A

port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DHCP Attacks
Two types of DHCP attacks are ____

A

DHCP Starvation and DHCP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Both DHCP Starvation and DHCP Spoofing attacks are mitigated by implementing ___.

A

DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The goal of the DHCP Starvation attack is to ____.

A

create a DoS for connecting clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DHCP Starvation Attack
___ has the ability to look at the entire scope of leasable IP addresses and tries to lease them all. Specifically, it creates DHCP discovery messages with bogus MAC addresses.

A

Gobbler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____occurs when a rogue DHCP server is connected to the network and provides false IP configuration parameters to legitimate clients.

A

DHCP Spoofing Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DHCP Spoofing Attack
A rogue server can provide a variety of misleading information:

____: The rogue server provides an invalid gateway or the IP address of its host to create a man-in-the-middle attack. This may go entirely undetected as the intruder intercepts the data flow through the network.

A

Wrong default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DHCP Spoofing Attack
A rogue server can provide a variety of misleading information:

____: The rogue server provides an incorrect DNS server address pointing the user to a nefarious website.

A

Wrong DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DHCP Spoofing Attack
A rogue server can provide a variety of misleading information:

___: The rogue server provides an invalid IP address effectively creating a DoS attack on the DHCP client.

A

Wrong IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP ATTACKS
According to the ARP RFC, a client is allowed to send an unsolicited ARP Request called a “__.”

A

gratuitous ARP

When a host sends a gratuitous ARP, other hosts on the subnet store the MAC address and IPv4 address contained in the gratuitous ARP in their ARP tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TRUE OR FALSE
The problem is that an attacker can send a gratuitous ARP message containing a spoofed MAC address to a switch, and the switch would update its MAC table accordingly.

A

TRUE
Therefore, any host can claim to be the owner of any IP and MAC address combination they choose. In a typical attack, a threat actor can send unsolicited ARP Replies to other hosts on the subnet with the MAC Address of the threat actor and the IPv4 address of the default gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP spoofing and ARP poisoning are mitigated by implementing __.

A

DAI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ is when a threat actor hijacks a valid IP address of another device on the subnet, or uses a random IP address

A

IP address spoofing

17
Q

TRUE OF FALSE
IP address spoofing is not difficult to mitigate, even when it is used inside a subnet in which the IP belongs.

A

FALSE
IP address spoofing is difficult to mitigate, especially when it is used inside a subnet in which the IP belongs.

18
Q

_____occur when the threat actors alter the MAC address of their host to match another known MAC address of a target host.

A

MAC address spoofing attacks

19
Q

To stop the switch from returning the port assignment to its correct state, the threat actor can create a ____ that will constantly send frames to the switch so that the switch maintains the incorrect or spoofed information.

A

program or script

20
Q

TRUE OR FALSE
There is no security mechanism at Layer 2 that allows a switch to verify the source of MAC addresses, which is what makes it so vulnerable to spoofing.

A

True

21
Q

IP and MAC address spoofing can be mitigated by implementing ___.

A

IPSG

22
Q

_Network attackers can manipulate the Spanning Tree Protocol (STP) to conduct an attack by spoofing the ___and changing the ___of a network

A

root bridge
topology

23
Q

To conduct an STP manipulation attack, the attacking host broadcasts STP _____ containing configuration and topology changes that will force spanning-tree recalculations

A

bridge protocol data units (BPDUs)

24
Q

The BPDUs sent by the attacking host announce a ____ in an attempt to be elected as the root bridge

A

lower bridge priority

25
Q

This STP attack is mitigated by implementing ___on all access ports.

A

BPDU Guard

26
Q

The __ is a proprietary Layer 2 link discovery protocol. It is enabled on all Cisco devices by default.

A

Cisco Discovery Protocol (CDP)

27
Q

TRUE OR FALSE
CDP broadcasts are sent encrypted and authenticated.

A

FALSE
CDP broadcasts are sent unencrypted and unauthenticated. Therefore, an attacker could interfere with the network infrastructure by sending crafted CDP frames containing bogus device information to directly-connected Cisco devices.

28
Q

To mitigate the exploitation of CDP,___ (limit/increase) the use of CDP on devices or ports.

A

limit

29
Q

To disable CDP globally on a device, use the __ global configuration mode command.

A

no cdp run

30
Q

To enable CDP globally, use the ___ global configuration command.

A

cdp run

31
Q

To disable CDP on a port, use the___interface configuration command

A

no cdp enable

32
Q

To enable CDP on a port, use the ____ interface configuration command.

A

cdp enable

33
Q

___ (LLDP) is also vulnerable to reconnaissance attacks.

A

Link Layer Discovery Protocol

34
Q

Configure ___to disable LLDP globally

A

no lldp run

35
Q

To disable LLDP on the interface, configure ___ and no ____.

A

no lldp transmit
lldp receive