Question: 1. _____ modifies MAC addresses in the ARP cache, so that network traffic goes from the victim's computer, through the attackers computer, and then to

1.  _____ modifies MAC addresses in the ARP cache, so that network traffic goes from the victim's computer, through the attacker’s computer, and then to the destination computer.
    A.     MAC cloning attack
    B.     ARP DoS attack
    C.     ARP on-path (person-in-the-middle) attack
    D.     MAC flooding attack

2.
What is an attack that causes normally available services to be unavailable?
    A.     DoS
    B.     MAC flood attack
    C.     operational technology (OT)
    D.     on-path (person-in-the-middle)

3.  What is a command language interpreter that runs on a command line that is used to interact with Unix and Linux?
    A.     Bash
    B.     Macros
    C.     PowerShell
    D.     VBA

4.  What is a way to bypass a wireless network filter?
    A.     ARP on-path (person-in-the-middle) attack
    B.     MAC cloning attack
    C.     ARP DoS attack
    D.     MAC flooding attack

5.  What are programs in PowerShell?
    A.     Python
    B.     VBA
    C.     Cmdlets
    D.     Bash

6.  What is a 48-bit address used to identify network interface cards? It’s also called “hardware address” or “physical address.”
    A.     switch
    B.     MAC
    C.     ARP
    D.     DNS

7.  What kind of attack is not done on RFID technology?
    A.     replay attack
    B.     spoofing
    C.     DoS
    D.     IV attack

8.  You keep getting unsolicited messages on your Bluetooth devices. What kind of attack is this?
    A.     rogue AP attack
    B.     bluejacking
    C.     jamming attack
    D.     bluesnarfing

9.  Which of the following runs on Windows OS, MacOS, Linux, and Unix?
    A.     Python
    B.     Bash
    C.     Macros
    D.     PowerShell

10.  What is a command-line shell that can be used to manage almost every aspect of the Windows operating system?
    A.     Macros
    B.     Python
    C.     Bash
    D.     PowerShell

Step by Step Solution

3.43 Rating (156 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

The detailed answer for the above question is provided below 1C ARP onpath personinthemiddle attack In an ARP onpath personinthemiddle attack the attacker modifies MAC addresses in the ARP cache to in... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!