Which method of protecting against a MAC flooding attack implements a list of known and acceptable MAC addresses?
- MAC address filtering
Which entity should be the focus of attack if the goal is to directly poison DNS entries on a client system?
HOSTS file
:
VLAN hopping is typically accomplished by which methods?
Double tagging
- Answer B.
- Switch spoofing
Which protection method can help to ensure that even if an evil-twin attack initially succeeds, the attacker will not be able to later access the online services you use?
Using multi-factor authentication
:
Which type of DoS attack is categorized as a fragmentation attack?
- Teardrop
Social engineering attacks rely on which attribute of the attacker?
Dishonesty
:
Which methodology or implementation has made the threat of rogue devices and services more prevalent?
BYOD
:
Which type of malware is able to propagate throughout an environment on its own?
Worm
:
What is the main result of a system whose ARP cache has been poisoned?'
The packets it transmits will be redirected
:
An on-path attack most closely resembles which other type of attack?
- Man-in-the-middle






.png)