Quiz for:
Understanding Onpath Attacks and Prevention

Question 1

Which protocol is exploited in ARP poisoning?

Question 2

What are the roles of the devices in an ARP poisoning scenario?

Question 3

What is another term for an onpath attack?

Question 4

What is another name for an onpath browser attack?

Question 5

In an ARP poisoning attack, what does the attacker alter?

Question 6

How does malware operate in an onpath browser attack?

Question 7

What can an onpath browser attack capture?

Question 8

What preventative measure can help protect against onpath attacks?

Question 9

What makes detection of an onpath attack difficult?

Question 10

What kind of network must an attacker be on to conduct ARP poisoning?

Question 11

How does the attacker redirect traffic in an ARP poisoning attack?

Question 12

What is a potential consequence of an onpath attack?

Question 13

Why is ARP susceptible to attacks?

Question 14

In ARP poisoning, which device does the attacker pretend to be?

Question 15

What is an onpath attack?