1_4_8 Section 1 – Attacks, Threats, and Vulnerabilities - 1.4 – Network Attacks - MAC Flooding and Cloning
41 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does the term MAC address refer to in networking?

  • Memory Allocation Card address
  • Media Acceleration Control address
  • Memory Access Control address
  • Media Access Control address (correct)
  • How long is an Ethernet MAC address in bits?

  • 64 bits
  • 32 bits
  • 8 bits
  • 48 bits (correct)
  • What do the first three bytes of a MAC address represent?

  • Manufacturer portion
  • Organizationally Unique Identifier (correct)
  • Serial number
  • Frame identifier
  • What function do switches perform at the MAC address level?

    <p>Interpret data frames and forward traffic between interfaces</p> Signup and view all the answers

    Why does a switch maintain a list of MAC addresses on the local network?

    <p>To know where to send incoming frames based on destination MAC addresses</p> Signup and view all the answers

    What is a significant operational requirement for switches in larger environments?

    <p>Maintaining a loop-free environment</p> Signup and view all the answers

    What is a common method attackers use to view network traffic?

    <p>Spoofing or cloning a MAC address</p> Signup and view all the answers

    What feature on most switches protects against MAC flooding?

    <p>Flood guard</p> Signup and view all the answers

    How can an attacker create a denial-of-service situation on a network?

    <p>By spoofing a MAC address</p> Signup and view all the answers

    What allows an attacker to match an existing allow list and gain unauthorized access to a network?

    <p>Spoofing a MAC address</p> Signup and view all the answers

    In what way does changing the MAC address help attackers gain unauthorized access?

    <p>By matching the MAC address of a legitimate device</p> Signup and view all the answers

    Why do most network drivers allow users to modify the MAC address of their devices?

    <p>To provide flexibility in addressing schemes</p> Signup and view all the answers

    What protocol is typically used to keep a network up and running?

    <p>STP</p> Signup and view all the answers

    What action does a switch take if it receives traffic with an unknown MAC address?

    <p>It adds the MAC address to its table</p> Signup and view all the answers

    In the example provided, where is Sam's MAC address located in the switch's MAC address table?

    <p>F0/1</p> Signup and view all the answers

    What happens when a switch reaches maximum capacity in its MAC address table?

    <p>It turns into a hub and sends all frames to all interfaces</p> Signup and view all the answers

    What is one challenge associated with a switch's MAC address table?

    <p>Attackers can exploit its limited capacity by sending traffic with different MAC addresses</p> Signup and view all the answers

    When a frame reaches a switch, how does it determine where to send the information?

    <p>By evaluating the destination MAC address</p> Signup and view all the answers

    What happens if a switch receives a frame with a MAC address already in its table?

    <p>It updates the port associated with that MAC address</p> Signup and view all the answers

    What does a switch do if it encounters a limitation in its MAC address storage capacity?

    <p>It floods all frames to every interface</p> Signup and view all the answers

    What does it mean when a switch behaves like a hub?

    <p>It sends all frames to every interface without addressing specific devices</p> Signup and view all the answers

    How does a switch differentiate itself from a hub?

    <p>By maintaining a table of MAC addresses and forwarding based on them</p> Signup and view all the answers

    What does the Organizationally Unique Identifier (OUI) represent in a MAC address?

    <p>The manufacturer of the network card</p> Signup and view all the answers

    What is the purpose of the last three bytes in an Ethernet MAC address?

    <p>Represent the specific card's serial number</p> Signup and view all the answers

    How do switches maintain a loop-free environment in networking?

    <p>By assigning unique MAC addresses to each network interface card</p> Signup and view all the answers

    In networking, what is the significance of switches interpreting the frame at the MAC address level?

    <p>Determining whether to forward or drop incoming traffic</p> Signup and view all the answers

    Why do we refer to the MAC address as the 'physical address' of a network card?

    <p>Due to its unique value assigned by manufacturers</p> Signup and view all the answers

    What unique characteristic differentiates the first three bytes from the last three bytes in an Ethernet MAC address?

    <p>First three bytes identify manufacturers, last three represent serial numbers</p> Signup and view all the answers

    What method can an attacker use to circumvent existing security devices and match the MAC address of a legitimate device on the network?

    <p>Spoofing a MAC address</p> Signup and view all the answers

    How do most switches protect against MAC flooding and prevent overloading of the MAC address table?

    <p>Using a feature called flood guard</p> Signup and view all the answers

    What can an attacker achieve by modifying the MAC address of their device to match another device on the network?

    <p>Accessing the network without authentication</p> Signup and view all the answers

    Why is it relatively easy for attackers to clone or modify MAC addresses?

    <p>The flexibility of network interface card settings</p> Signup and view all the answers

    What is one common outcome when an attacker uses the same MAC address as another user on the network?

    <p>Creation of a denial-of-service situation</p> Signup and view all the answers

    How can an attacker use MAC address spoofing to disrupt network operations?

    <p>To create a denial-of-service situation</p> Signup and view all the answers

    What does a switch do if it receives traffic with a MAC address not listed in its MAC address table?

    <p>It floods the traffic to all interfaces.</p> Signup and view all the answers

    What is one consequence of a switch's MAC address table reaching maximum capacity?

    <p>The switch turns into a hub, sending all frames to all interfaces.</p> Signup and view all the answers

    How does a switch handle frames received with a MAC address already listed in its table?

    <p>It forwards the frame to the correct interface.</p> Signup and view all the answers

    If an attacker floods a switch with thousands of new MAC addresses, what is the likely outcome?

    <p>The switch's MAC address table will fill up and behave like a hub.</p> Signup and view all the answers

    What does it mean when a switch acts as a hub due to its MAC address table limitations?

    <p>The switch sends every frame to every interface.</p> Signup and view all the answers

    What action does a switch take if it encounters a limitation in its MAC address storage capacity?

    <p>It behaves like a hub and sends all frames to all interfaces.</p> Signup and view all the answers

    Why is flooding a switch with new MAC addresses considered an attack technique?

    <p>It overloads the switch's memory capacity.</p> Signup and view all the answers

    More Like This

    MAC Address Structure
    6 questions

    MAC Address Structure

    BoomingMookaite avatar
    BoomingMookaite
    Ethernet Networking Concepts
    9 questions
    Ethernet Collision Handling
    18 questions
    Use Quizgecko on...
    Browser
    Browser