Which two protocols pose switching threats? (Choose two.)Select one or more:WPA2ARPSTPIPRIPICMP
Question
Which two protocols pose switching threats?
(Choose two.)
Select one or more:
- WPA2
- ARP
- STP
- IP
- RIP
- ICMP
Solution
The two protocols that pose switching threats are ARP (Address Resolution Protocol) and STP (Spanning Tree Protocol).
-
ARP: ARP is used to map an IP address to a physical (MAC) address on the local network. However, it can be exploited in an ARP spoofing (or ARP poisoning) attack, where an attacker sends fake ARP messages to associate their MAC address with the IP address of another host (such as the default gateway), causing traffic intended for that IP address to be sent to the attacker instead.
-
STP: STP is used to prevent loops in a network topology. However, it can be exploited in an STP attack, where an attacker with access to the network can send crafted STP messages to reconfigure the network topology and cause network disruption or traffic redirection.
Similar Questions
Which two protocols pose switching threats? (Choose two.)Select one or more:WPA2ARPSTPIPRIPICMP
Which of the following security encryption standards is the weakest?WPA3WPAWEPWPA2
Why is WPA2 better than WPA?Select one:mandatory use of AES algorithmsreduced keyspacereduced processing timesupports TKIP
Which of the following is the security standard for WPA2?Group of answer choices802.11i802.11ad802.11n802.11a
Which of the following Wi-Fi security protocols uses GCMP-256 for encryption and HMAC-SHA-384 for authentication?CCMPPEAPWEPWPA3
Upgrade your grade with Knowee
Get personalized homework help. Review tough concepts in more detail, or go deeper into your topic by exploring other relevant questions.