Skip to main content

Posts

Showing posts with the label arp

How ARP Works: Understanding ARP Requests, Replies, and ARP Cache

 How ARP Works: Understanding ARP Requests, Replies, and ARP Cache Address Resolution Protocol (ARP) is an essential protocol in the world of networking. It's responsible for mapping IP addresses to MAC addresses within a local area network (LAN). ๐Ÿ”„ How ARP Works When a host wants to communicate with another device, it needs the MAC address associated with the destination IP. If the MAC address is unknown, the host sends out a broadcast ARP Request asking: ๐Ÿ—จ️ “Who has IP address X.X.X.X? Tell me your MAC address.” The device with the matching IP sends an ARP Reply with its MAC address, allowing communication to begin. ๐Ÿ“จ ARP Messages ARP uses two packet types: ARP Request Destination MAC: FF-FF-FF-FF-FF-FF (broadcast) Target MAC: 00-00-00-00-00-00 (unknown) ARP Reply Uses unicast MAC addresses for both source and destination Header Fields Include: Source MAC and IP Target MAC and IP ๐Ÿงช Real-World Examples Host-to-Host on Same Network PC2 want...

IT Security: Defense against the digital dark arts

 Week 4 practice quiz, Digital Dark Arts 1 . Question 1 What traffic would an implicit deny firewall rule block? 1 point Outbound traffic Nothing unless blocked Inbound traffic Everything not allowed 2 . Question 2 The process of converting log entry fields into a standard format is called _______. 1 point Log analysis Log auditing Log encryption Log normalization 3 . Question 3 A ______ can protect your network from DoS attacks. 1 point IP Source Guard DHCP Snooping Flood Guard Dynamic ARP Inspection 4 . Question 4 Using different VLANs for different network devices is an example of _______. 1 point Network Separation Implicit Denial Remote Access Network Encryption 5 . Question 5 How do you protect against rogue DHCP server attacks? 1 point IP Source Guard Flood Guard Dynamic ARP Inspection DHCP Snooping 6 . Question 6 What does Dynamic ARP Inspection protect against? 1 point Rogue DHCP Server attacks IP Spoofing attacks ARP Man-in-the-middle attacks DoS attacks 7 . Question 7 Wh...