Week 5 Table 6-3 lists important network attacks and mitigation techniques. habi
ID: 3853077 • Letter: W
Question
Week 5 Table 6-3 lists important network attacks and mitigation techniques. habie ens Summary of Important Network Attcks and Mitigation Techniques to Know for Summary of Network Attacks Table 6-3 the Exam Summary Key Topic Mitigation Techniques Network Attack MAC flooding Description A MAC flood sends numerous packets Implement 802.1X. to the switch, each of which has a different source MAC address, in an Use port security. attempt to use up the memory on the Implement dynamic VLANs and switch. NIDSs. Consistently monitor the network. Put unplugged ports on the switch VLAN hopping The act of gaining access to traffic on other VLANs that would not normally into an unused VLAN be accessible by jumping from one VLAN to another. Configure the switch ports in charge of passing tagged frames to be trunks and to explicitly forward specific tags. Pick an unused VLAN as the default VLAN for all trunks, and do not use it for any other intent. Avoid using default VLAN names such as VLAN or VLAN1. Upgrade firmware or software. Consider redesigning the VLAN if multiple 802.1Q switches are being used.Explanation / Answer
It is hard to determine an defense as the best among all the listed attacks becuase each attack have different ability and the impact of the attack on the network is totally different and managing the network is also the biggest task here. The management of the network along with the attacks plays the major role in getting the network safe and sound.But, according to me the best techniques are as follows:
Hence, if all these above techniques are been applied to the network than there would be no harm to the network to a great extent .
Please rate the answer if it helped.....Thankyou
Hope it helps.....
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.