Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- If an attacker is trying to see all the traffic traveling through a switch, which of the following protocols prevents them from seeing any sensitive data?
- FTP
- IMAP
- Telnet
- POP
- SMTP
- SSH
- Which of the following methods can be used to collect data from a fully switched network or disable some of the switch's traffic isolation features? (Select two.)
- ARP spoofing
- Promiscuous mode
- DHCP starvation
- MAC flooding
- In terms of sniffer discovery on a network, which of the following is true?
- Send ARP messages to all systems and wait for NOARP answers to find the sniffer.
- Ping all addresses and look for a lag in answers to find the sniffer.
- Finding the sniffer on the network is somewhat impossible.
- Configure the IDS to look for promiscuous NICs to find the sniffer.
- Which of the following preventive...