1_4_8 Section 1 – Attacks, Threats, and Vulnerabilities - 1.4 – Network Attacks - MAC Flooding and Cloning
41 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does the term MAC address refer to in networking?

  • Memory Allocation Card address
  • Media Acceleration Control address
  • Memory Access Control address
  • Media Access Control address (correct)

How long is an Ethernet MAC address in bits?

  • 64 bits
  • 32 bits
  • 8 bits
  • 48 bits (correct)

What do the first three bytes of a MAC address represent?

  • Manufacturer portion
  • Organizationally Unique Identifier (correct)
  • Serial number
  • Frame identifier

What function do switches perform at the MAC address level?

<p>Interpret data frames and forward traffic between interfaces (C)</p> Signup and view all the answers

Why does a switch maintain a list of MAC addresses on the local network?

<p>To know where to send incoming frames based on destination MAC addresses (C)</p> Signup and view all the answers

What is a significant operational requirement for switches in larger environments?

<p>Maintaining a loop-free environment (B)</p> Signup and view all the answers

What is a common method attackers use to view network traffic?

<p>Spoofing or cloning a MAC address (A)</p> Signup and view all the answers

What feature on most switches protects against MAC flooding?

<p>Flood guard (C)</p> Signup and view all the answers

How can an attacker create a denial-of-service situation on a network?

<p>By spoofing a MAC address (A)</p> Signup and view all the answers

What allows an attacker to match an existing allow list and gain unauthorized access to a network?

<p>Spoofing a MAC address (D)</p> Signup and view all the answers

In what way does changing the MAC address help attackers gain unauthorized access?

<p>By matching the MAC address of a legitimate device (C)</p> Signup and view all the answers

Why do most network drivers allow users to modify the MAC address of their devices?

<p>To provide flexibility in addressing schemes (A)</p> Signup and view all the answers

What protocol is typically used to keep a network up and running?

<p>STP (C)</p> Signup and view all the answers

What action does a switch take if it receives traffic with an unknown MAC address?

<p>It adds the MAC address to its table (A)</p> Signup and view all the answers

In the example provided, where is Sam's MAC address located in the switch's MAC address table?

<p>F0/1 (C)</p> Signup and view all the answers

What happens when a switch reaches maximum capacity in its MAC address table?

<p>It turns into a hub and sends all frames to all interfaces (B)</p> Signup and view all the answers

What is one challenge associated with a switch's MAC address table?

<p>Attackers can exploit its limited capacity by sending traffic with different MAC addresses (B)</p> Signup and view all the answers

When a frame reaches a switch, how does it determine where to send the information?

<p>By evaluating the destination MAC address (C)</p> Signup and view all the answers

What happens if a switch receives a frame with a MAC address already in its table?

<p>It updates the port associated with that MAC address (A)</p> Signup and view all the answers

What does a switch do if it encounters a limitation in its MAC address storage capacity?

<p>It floods all frames to every interface (D)</p> Signup and view all the answers

What does it mean when a switch behaves like a hub?

<p>It sends all frames to every interface without addressing specific devices (D)</p> Signup and view all the answers

How does a switch differentiate itself from a hub?

<p>By maintaining a table of MAC addresses and forwarding based on them (D)</p> Signup and view all the answers

What does the Organizationally Unique Identifier (OUI) represent in a MAC address?

<p>The manufacturer of the network card (B)</p> Signup and view all the answers

What is the purpose of the last three bytes in an Ethernet MAC address?

<p>Represent the specific card's serial number (D)</p> Signup and view all the answers

How do switches maintain a loop-free environment in networking?

<p>By assigning unique MAC addresses to each network interface card (B)</p> Signup and view all the answers

In networking, what is the significance of switches interpreting the frame at the MAC address level?

<p>Determining whether to forward or drop incoming traffic (C)</p> Signup and view all the answers

Why do we refer to the MAC address as the 'physical address' of a network card?

<p>Due to its unique value assigned by manufacturers (A)</p> Signup and view all the answers

What unique characteristic differentiates the first three bytes from the last three bytes in an Ethernet MAC address?

<p>First three bytes identify manufacturers, last three represent serial numbers (A)</p> Signup and view all the answers

What method can an attacker use to circumvent existing security devices and match the MAC address of a legitimate device on the network?

<p>Spoofing a MAC address (C)</p> Signup and view all the answers

How do most switches protect against MAC flooding and prevent overloading of the MAC address table?

<p>Using a feature called flood guard (C)</p> Signup and view all the answers

What can an attacker achieve by modifying the MAC address of their device to match another device on the network?

<p>Accessing the network without authentication (A)</p> Signup and view all the answers

Why is it relatively easy for attackers to clone or modify MAC addresses?

<p>The flexibility of network interface card settings (A)</p> Signup and view all the answers

What is one common outcome when an attacker uses the same MAC address as another user on the network?

<p>Creation of a denial-of-service situation (C)</p> Signup and view all the answers

How can an attacker use MAC address spoofing to disrupt network operations?

<p>To create a denial-of-service situation (A)</p> Signup and view all the answers

What does a switch do if it receives traffic with a MAC address not listed in its MAC address table?

<p>It floods the traffic to all interfaces. (C)</p> Signup and view all the answers

What is one consequence of a switch's MAC address table reaching maximum capacity?

<p>The switch turns into a hub, sending all frames to all interfaces. (D)</p> Signup and view all the answers

How does a switch handle frames received with a MAC address already listed in its table?

<p>It forwards the frame to the correct interface. (A)</p> Signup and view all the answers

If an attacker floods a switch with thousands of new MAC addresses, what is the likely outcome?

<p>The switch's MAC address table will fill up and behave like a hub. (C)</p> Signup and view all the answers

What does it mean when a switch acts as a hub due to its MAC address table limitations?

<p>The switch sends every frame to every interface. (D)</p> Signup and view all the answers

What action does a switch take if it encounters a limitation in its MAC address storage capacity?

<p>It behaves like a hub and sends all frames to all interfaces. (C)</p> Signup and view all the answers

Why is flooding a switch with new MAC addresses considered an attack technique?

<p>It overloads the switch's memory capacity. (C)</p> Signup and view all the answers

More Like This

Ethernet Networking Concepts
9 questions
Ethernet Collision Handling
18 questions
Ethernet Networking Basics Quiz
48 questions
Use Quizgecko on...
Browser
Browser