Question

In: Computer Science

What is a common attack technique used against ARP to send traffic to wrong destination? Question...

What is a common attack technique used against ARP to send traffic to wrong destination?

Question 8 options:

ARP timeout

None of these

Static ARP entries

ARP reply

What is the behavior of the firewall in a situation when there are multiple eligible routing table rules for the packet source and destination?

Question 10 options:

DROP packet

ALLOW packet

Depend on last rule executed

Depends on first rule executed

List all the open Firewall ports for this IP address 162.241.253.120.

When you try to access services provided at the IP 162.241.253.120 from your host machine, what path do packets from your machine take right before they reach the destination? Please identify and list the IP or Host name of last network hop before final destination?

Solutions

Expert Solution

Q.8 Ans: - 2) None of these.

Explanation: -

ARP Spoofing or Poisoning the commonly attacking technique used against ARP to send traffic to wrong destination. This technique disguises the data packets to the wrong or any fake destination. Attackers and Hackers uses this technique against ARP to send the network traffic to wrong address and then crash the network.

ARP timeout is the timeout for any entry in caching table when that entry is not being used in the given amount of time. Then that entry gets removed from the caching table. Hence it cannot be an attacking technique used against ARP to send traffic to wrong destination.

Static ARP Entry is the mapping of addresses between the media access control and the Internet protocol addresses. If there exist any problem of reading the MAC address in the network then Static ARP Entry can be created to diagnose that problem in the network.

Address Resolution Protocol reply contains the destination address of the IP and MAC. It is simply a reply or response to the network about IP address and MAC address of the host.

Q.10 Ans: -

2) ALLOW Packet

Explanation: - When there are multiple eligible routing tables rules for the packet source and destination then it allows the packets to get delivered from their source to destination as multiple table rules are eligible.

DROP packet is used in the case of Network Congestion.

It does not depend on the last rule executed or the first rule executed. It simply allows the packets based on their routing table information.


Related Solutions

36. Explain what the technique known as soft state is and how it applies to ARP...
36. Explain what the technique known as soft state is and how it applies to ARP and the ARP cache.
What are the strengths and weaknesses of the mark-recapture technique and what is the technique used...
What are the strengths and weaknesses of the mark-recapture technique and what is the technique used for?
QUESTION 37 Match the appropriate term to the definition or technique. Each technique can be used...
QUESTION 37 Match the appropriate term to the definition or technique. Each technique can be used only once. As such, choice the best definition       -       A.       B.       C.       D.    Hypothesis Test       -       A.       B.       C.       D.    ANOVA       -       A.       B.       C.       D.    Two Way ANOVA      ...
Question 21 What property of ARP causes the request to be flooded out all ports of...
Question 21 What property of ARP causes the request to be flooded out all ports of a switch except for the port receiving the ARP request? a. Entries in an ARP table are time-stamped and are purged after the timeout expires. b. The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame. c. ARP replies are broadcast on the network when a host receives an ARP request. d. The type field 0x806 appears in the header of...
(1) What is the most common technique used for finding duplicate blocks/data? A. Bit-for-bit comparisons on...
(1) What is the most common technique used for finding duplicate blocks/data? A. Bit-for-bit comparisons on all new blocks B. Hashing/fingerprinting C. Encryption D. Storing all blocks in an content addressable object store (2) Which of the following describes sub-LUN auto-tiering? A. Placing data on tiers depending on its access pattern B. Placing data on different tiers of storage based on when the blocks were written C. Placing data on tiers of storage based on the LUN name D. Placing...
What is the most common SQL Injection Attack code that could be put into a vulnerable...
What is the most common SQL Injection Attack code that could be put into a vulnerable website textbox that means "OR True"?
What is a Denial of Service attack? Describe two common Denial of Service (DoS) attacks on...
What is a Denial of Service attack? Describe two common Denial of Service (DoS) attacks on servers?
Describe RAID - What it stands for, what it protects against, and what are common implementations.
Describe RAID - What it stands for, what it protects against, and what are common implementations.
What is wrong with using the cost of the specific capital used to finance a project...
What is wrong with using the cost of the specific capital used to finance a project as the discount rate in relation to that project?
what is used to prevent one person from setting up an account to send an outgoing...
what is used to prevent one person from setting up an account to send an outgoing wire payment to ?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT