In: Computer Science
What is a common attack technique used against ARP to send traffic to wrong destination?
Question 8 options:
ARP timeout |
|
None of these |
|
Static ARP entries |
|
ARP reply |
What is the behavior of the firewall in a situation when there are multiple eligible routing table rules for the packet source and destination?
Question 10 options:
DROP packet |
|
ALLOW packet |
|
Depend on last rule executed |
|
Depends on first rule executed |
List all the open Firewall ports for this IP address 162.241.253.120.
When you try to access services provided at the IP 162.241.253.120 from your host machine, what path do packets from your machine take right before they reach the destination? Please identify and list the IP or Host name of last network hop before final destination?
Q.8 Ans: - 2) None of these.
Explanation: -
ARP Spoofing or Poisoning the commonly attacking technique used against ARP to send traffic to wrong destination. This technique disguises the data packets to the wrong or any fake destination. Attackers and Hackers uses this technique against ARP to send the network traffic to wrong address and then crash the network.
ARP timeout is the timeout for any entry in caching table when that entry is not being used in the given amount of time. Then that entry gets removed from the caching table. Hence it cannot be an attacking technique used against ARP to send traffic to wrong destination.
Static ARP Entry is the mapping of addresses between the media access control and the Internet protocol addresses. If there exist any problem of reading the MAC address in the network then Static ARP Entry can be created to diagnose that problem in the network.
Address Resolution Protocol reply contains the destination address of the IP and MAC. It is simply a reply or response to the network about IP address and MAC address of the host.
Q.10 Ans: -
2) ALLOW Packet
Explanation: - When there are multiple eligible routing tables rules for the packet source and destination then it allows the packets to get delivered from their source to destination as multiple table rules are eligible.
DROP packet is used in the case of Network Congestion.
It does not depend on the last rule executed or the first rule executed. It simply allows the packets based on their routing table information.