The following are some questions based on the topics we have covered in this chapter:
- How can you prevent an attacker from reading your data?
- What technique can an attacker perform to intercept a victim's network traffic?
- What security control does a Cisco IOS switch support to prevent an MITM attack?
- Why should an IT professional not use Telnet?
- How can you detect a sniffer on a network?