How do you defend against ARP spoofing?
A.
Place static ARP entries on servers, workstation and routers
B.
True IDS Sensors to look for large amount of ARP traffic on local subnets C. Use private VLANS
C.
Use ARPWALL system and block ARP spoofing attacks
Explanation:
ARPWALL is a opensource tools will give early warning when arp attack occurs.
This tool is still under construction.
ARPWALL doesn’t even seem to beeing developed at all. No activity whatsoever. You probably could use ArpWatch and parse the logfile to do the same.
Answer A would stop any ARP poisioning I guess.
The answer here A,C,D
nope. the answer here is A,B,C. ARPWALL has never been fully developed, and therefore, is not functional
How do you defend against ARP Spoofing? Select three.
A. Use ARPWALL system and block ARP spoofing attacks
B. Tune IDS Sensors to look for large amount of ARP traffic on local subnets
C. Use private VLANS
D. Place static ARP entries on servers, workstation and routers
Answer: A,C,D
IDS option may works fine in case of monitoring the traffic from outside the network but not from internal hosts.
Seems like the only bad answer is the IDS. Arp Spoofing would not necessarily lead to large amount of ARP traffic.
I think its a problem with the reader,It was supposed to select A,B and C ..
Use private Vlans,
Use IDS to track large arp requests
Place mac addresses statically in mac table of routers