Question 1
Which protocol is exploited in ARP poisoning?
Question 2
What are the roles of the devices in an ARP poisoning scenario?
Question 3
What is another term for an onpath attack?
Question 4
What is another name for an onpath browser attack?
Question 5
In an ARP poisoning attack, what does the attacker alter?
Question 6
How does malware operate in an onpath browser attack?
Question 7
What can an onpath browser attack capture?
Question 8
What preventative measure can help protect against onpath attacks?
Question 9
What makes detection of an onpath attack difficult?
Question 10
What kind of network must an attacker be on to conduct ARP poisoning?
Question 11
How does the attacker redirect traffic in an ARP poisoning attack?
Question 12
What is a potential consequence of an onpath attack?
Question 13
Why is ARP susceptible to attacks?
Question 14
In ARP poisoning, which device does the attacker pretend to be?
Question 15
What is an onpath attack?