Questions

The following are some questions based on the topics we have covered in this chapter:

  1. How can you prevent an attacker from reading your data?
  2. What technique can an attacker perform to intercept a victim's network traffic?
  3. What security control does a Cisco IOS switch support to prevent an MITM attack?
  4. Why should an IT professional not use Telnet?
  5. How can you detect a sniffer on a network?
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.140.198.173