MAC Addresses Flashcards

1
Q

MAC is the _________ address for our network interfaces

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Each host in a network has its own __ -bit ( __ octets) Media Access Control (MAC) address

A

48-bit (6 octets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

different standards for the MAC address:
x3

A

Ethernet (IEEE 802.3)
Bluetooth (IEEE 802.15)
WLAN (IEEE 802.11)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the MAC address addresses the physical connection (network card, Bluetooth, or WLAN adapter) of a host

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Each network card has its individual MAC address…….

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The MAC address consists of a total of _ bytes.

A

6 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Each IP packet has a ______ address and a _______ address.

A

Each IP packet has a sender address and a destination address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The first half of the MAC address (3 bytes / 24 bit) is the so-called _________ _____ _______ (OUI) for the respective manufacturers.

A

Organization Unique Identifier (OUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The last half of the MAC address is called the _________ _______ ____ or _______ _______ ________ (NIC), which the manufacturers assign. The manufacturer sets this bit sequence only once and thus ensures that the complete address is unique.

A

Individual Address Part or Network Interface Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If a host with the IP target address is located in the same subnet, the delivery is made directly to the target computer’s _____ address.

A

directly to the target computer’s physical address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If the Ethernet frame’s destination address matches its own layer 2 address, the router will ______ the _____ to the ______ _______.

A

the router will forward the frame to the higher layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

______ _______ _______ (ARP) is used in IPv4 to determine the MAC addresses associated with the IP addresses.

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The last bit of the _____ octet identifies the MAC address as ______ (0) or ________ (1)

A

The last bit identifies the MAC address as Unicast (0) or Multicast (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

With unicast, it means that the packet sent will reach only ___ specific host.

A

one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

With multicast, the packet is sent ____ to all hosts on the _____ network, which then decides whether or not to accept the packet based on their configuration

A

With multicast, the packet is sent once to all hosts on the local network, which then decides whether or not to accept the packet based on their configuration

16
Q

The second last bit in the first octet identifies whether it is a global OUI, defined by the IEEE, or a locally administrated MAC address
Global OUI is:

A

Global OUI (2nd to last bit in first octet is 0)
Representation 1st Octet
Binary 1101 1100

17
Q

The second last bit in the first octet identifies whether it is a global OUI, defined by the IEEE, or a locally administrated MAC address
Locally Administered is:

A

Locally Administered (2nd to last bit in first octet is 1)
Representation 1st Octet
Binary 1101 1110

18
Q

This involves altering the MAC address of a device to match that of another device, typically to gain unauthorized access to a network.

A

MAC spoofing

19
Q

This involves sending many packets with different MAC addresses to a network switch, causing it to reach its MAC address table capacity and effectively preventing it from functioning correctly.

A

MAC flooding

20
Q

Some networks may be configured only to allow access to devices with specific MAC addresses that we could potentially exploit by attempting to gain access to the network using a spoofed MAC address.

A

MAC address filtering

21
Q

Address Resolution Protocol is a _____ protocol

A

network protocol

22
Q

Address Resolution Protocol is AKA

A

ARP

23
Q

ARP is used to resolve _____ (layer 3 of the OSI model) to a ______ (layer 2 of the OSI model) MAC address.

A

Network layer 3 of the OSI model to a
Data Link layer 2 of the OSI model

24
Q

What does ARP do?

A

it maps a host’s IP address to its corresponding MAC address to facilitate communication between devices on a Local Area Network (LAN)

25
Q

When a device on a LAN wants to communicate with another device, it sends a broadcast message containing the destination IP address and its own MAC address

A
26
Q

The device with the matching IP address responds with its own MAC address, and the two devices can then communicate directly using their MAC addresses. This process is known as ___ _______.

A

ARP resolution

27
Q

ARP is an important part of the network communication process because it allows devices to send and receive data using MAC addresses rather than IP addresses, which can be more efficient

A
28
Q

Two types of request messages can be used:

A

ARP Request
ARP Reply

29
Q

ARP Request

A

When a device wants to communicate with another device on a LAN, it sends an ARP request to resolve the destination device’s IP address to its MAC address. The request is broadcast to all devices on the LAN and contains the IP address of the destination device. The device with the matching IP address responds with its MAC address

30
Q

ARP Reply

A

When a device receives an ARP request, it sends an ARP reply to the requesting device with its MAC address. The reply message contains the IP and MAC addresses of both the requesting and the responding devices

31
Q

The goal of _____ is to associate our MAC address with the IP address of a legitimate device on the company’s network, effectively allowing us to intercept traffic intended for the legitimate device

A

ARP Spoofing

32
Q

ARP Spoofing, which can be used to _______ or ________ traffic on the network

A

intercept or manipulate traffic on the network

33
Q

ARP spoofing, also known as ARP _____ _______ or ARP ______ ______

A

ARP cache poisoning or ARP poison routing,

34
Q

Tools for ARP spoofing consist of:
x2

A

Ettercap
Cain & Abel

35
Q

ARP poisoning to perform various activities, such as ______ ______ _______, redirecting traffic, or launching _____ attacks

A

stealing sensitive information, redirecting traffic, or launching MITM attacks

36
Q
A