exam questions

Exam 200-301 All Questions

View all questions & answers for the 200-301 exam

Exam 200-301 topic 1 question 995 discussion

Actual exam question from Cisco's 200-301
Question #: 995
Topic #: 1
[All 200-301 Questions]

Which security method is used to prevent man-in-the-middle attacks?

  • A. authentication
  • B. anti-replay
  • C. authorization
  • D. accounting
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mageknight
Highly Voted 2 years, 2 months ago
Anti-replay is a security method that is used to prevent man-in-the-middle attacks by ensuring that network packets are received and processed only once. This is typically accomplished by adding a unique identifier, called a sequence number or nonce, to each packet. The recipient of the packet keeps track of the sequence numbers that it has received and processes only packets that have not been received before. If a packet with a duplicate sequence number is received, it is discarded.
upvoted 9 times
purenuker
2 years ago
But isn't this just how TCP functions in ''normal way'' - with seq and ack numbers ?
upvoted 1 times
lolungos
1 year, 11 months ago
With TCP as a man in the middle you can request re-transmission
upvoted 2 times
...
...
...
Leethy
Highly Voted 2 years ago
Selected Answer: A
Option B: Anti-replay is a security method used to prevent an attacker from intercepting and replaying valid data, but it is not specifically used to prevent man-in-the-middle (MITM) attacks. Anti-replay works by using sequence numbers or timestamps to ensure that each piece of data is unique and has not been intercepted and replayed by an attacker. While this can help prevent certain types of attacks, it is not a complete solution for preventing MITM attacks. Authentication, on the other hand, is specifically designed to prevent MITM attacks by verifying the identity of each party in a communication.
upvoted 6 times
...
3040636
Most Recent 7 months, 3 weeks ago
Authentication
upvoted 1 times
...
Artyom
11 months, 3 weeks ago
Selected Answer: A
The authentication method is used because it verifies the identities of participants in a network or communication. In the case of a man-in-the-middle attack, an attacker attempts to interfere with communication between two parties by pretending to be one of them. Authentication ensures that each party is indeed who they claim to be, thus preventing the success of a man-in-the-middle attack.
upvoted 1 times
...
3b5fdb2
11 months, 3 weeks ago
Selected Answer: B
I think it's B. MITM attacks can occur over the athuentication-process of WPA2 with KRACK. WPA3 should fix that.
upvoted 1 times
...
[Removed]
1 year, 1 month ago
Selected Answer: A
it´s A anti-replay is a security mechanism used to prevent replay attacks, not man-in-the-middle attacks.
upvoted 3 times
...
fd17639
1 year, 3 months ago
Selected Answer: B
B is correct
upvoted 1 times
...
[Removed]
1 year, 4 months ago
Selected Answer: B
From Wendell Odom, CCNA 200-301 Official Cert Guide Vol. 2: "Anti-replay: Preventing a man in the middle from copying and later replaying the packets sent by a legitimate user, for the purpose of appearing to be a legitimate user." It's the correct answer. None of the other options are strict protections against MITM.
upvoted 2 times
...
[Removed]
1 year, 7 months ago
Anti replay : Preventing a man in the middle from copying and later replaying the packets sent by a legitimate user, for the purpose of appearing to be a legitimate user. From OCG
upvoted 3 times
...
Philipli308
1 year, 9 months ago
Selected Answer: A
Man-in-the-middle attack should be the person without authentication, they try to collect all the packet of network traffic by the software sniffer and reached the goal.
upvoted 3 times
...
Shabeth
1 year, 10 months ago
Selected Answer: A
A. Authentication- MITM attacks can be prevented or detected by two means: authentication and tamper detection.
upvoted 3 times
...
[Removed]
1 year, 10 months ago
Selected Answer: A
Authentication is the security method used to prevent man-in-the-middle attacks. Man-in-the-middle attacks occur when an attacker intercepts and alters communication between two parties, without their knowledge. By authenticating the identities of the communicating parties, it becomes more difficult for an attacker to impersonate one of them and insert themselves into the communication. Authentication methods can include passwords, digital certificates, biometric authentication, two-factor authentication (2FA), and other mechanisms that verify the identity of the communicating parties. By ensuring that the parties involved are who they claim to be, authentication helps protect against man-in-the-middle attacks and helps establish a secure and trusted communication channel.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago