Skip to main content

Posts

Showing posts with the label arp

How ARP Works: Understanding ARP Requests, Replies, and ARP Cache

 How ARP Works: Understanding ARP Requests, Replies, and ARP Cache Address Resolution Protocol (ARP) is an essential protocol in the world of networking. It's responsible for mapping IP addresses to MAC addresses within a local area network (LAN). 🔄 How ARP Works When a host wants to communicate with another device, it needs the MAC address associated with the destination IP. If the MAC address is unknown, the host sends out a broadcast ARP Request asking: 🗨️ “Who has IP address X.X.X.X? Tell me your MAC address.” The device with the matching IP sends an ARP Reply with its MAC address, allowing communication to begin. 📨 ARP Messages ARP uses two packet types: ARP Request Destination MAC: FF-FF-FF-FF-FF-FF (broadcast) Target MAC: 00-00-00-00-00-00 (unknown) ARP Reply Uses unicast MAC addresses for both source and destination Header Fields Include: Source MAC and IP Target MAC and IP 🧪 Real-World Examples Host-to-Host on Same Network PC2 want...

IT Security: Defense against the digital dark arts

 Week 4 practice quiz, Digital Dark Arts 1 . Question 1 What traffic would an implicit deny firewall rule block? 1 point Outbound traffic Nothing unless blocked Inbound traffic Everything not allowed 2 . Question 2 The process of converting log entry fields into a standard format is called _______. 1 point Log analysis Log auditing Log encryption Log normalization 3 . Question 3 A ______ can protect your network from DoS attacks. 1 point IP Source Guard DHCP Snooping Flood Guard Dynamic ARP Inspection 4 . Question 4 Using different VLANs for different network devices is an example of _______. 1 point Network Separation Implicit Denial Remote Access Network Encryption 5 . Question 5 How do you protect against rogue DHCP server attacks? 1 point IP Source Guard Flood Guard Dynamic ARP Inspection DHCP Snooping 6 . Question 6 What does Dynamic ARP Inspection protect against? 1 point Rogue DHCP Server attacks IP Spoofing attacks ARP Man-in-the-middle attacks DoS attacks 7 . Question 7 Wh...