Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- If an attacker is trying to see all the traffic traveling through a switch, which of the following protocols prevents them from seeing any sensitive data?
- FTP
- IMAP
- Telnet
- POP
- SMTP
- SSH
- Which of the following methods can be used to collect data from a fully switched network or disable some of the switch's traffic isolation features? (Select two.)
- ARP spoofing
- Promiscuous mode
- DHCP starvation
- MAC flooding
- In terms of sniffer discovery on a network, which of the following is true?
- Which of the following preventive...