exam questions

Exam 200-301 All Questions

View all questions & answers for the 200-301 exam

Exam 200-301 topic 1 question 995 discussion

Actual exam question from Cisco's 200-301
Question #: 995
Topic #: 1
[All 200-301 Questions]

Which security method is used to prevent man-in-the-middle attacks?

  • A. authentication
  • B. anti-replay
  • C. authorization
  • D. accounting
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mageknight
Highly Voted 2 years, 4 months ago
Anti-replay is a security method that is used to prevent man-in-the-middle attacks by ensuring that network packets are received and processed only once. This is typically accomplished by adding a unique identifier, called a sequence number or nonce, to each packet. The recipient of the packet keeps track of the sequence numbers that it has received and processes only packets that have not been received before. If a packet with a duplicate sequence number is received, it is discarded.
upvoted 9 times
purenuker
2 years, 3 months ago
But isn't this just how TCP functions in ''normal way'' - with seq and ack numbers ?
upvoted 1 times
lolungos
2 years, 1 month ago
With TCP as a man in the middle you can request re-transmission
upvoted 2 times
...
...
...
Leethy
Highly Voted 2 years, 3 months ago
Selected Answer: A
Option B: Anti-replay is a security method used to prevent an attacker from intercepting and replaying valid data, but it is not specifically used to prevent man-in-the-middle (MITM) attacks. Anti-replay works by using sequence numbers or timestamps to ensure that each piece of data is unique and has not been intercepted and replayed by an attacker. While this can help prevent certain types of attacks, it is not a complete solution for preventing MITM attacks. Authentication, on the other hand, is specifically designed to prevent MITM attacks by verifying the identity of each party in a communication.
upvoted 6 times
...
3040636
Most Recent 10 months ago
Authentication
upvoted 1 times
...
Artyom
1 year, 1 month ago
Selected Answer: A
The authentication method is used because it verifies the identities of participants in a network or communication. In the case of a man-in-the-middle attack, an attacker attempts to interfere with communication between two parties by pretending to be one of them. Authentication ensures that each party is indeed who they claim to be, thus preventing the success of a man-in-the-middle attack.
upvoted 1 times
...
3b5fdb2
1 year, 2 months ago
Selected Answer: B
I think it's B. MITM attacks can occur over the athuentication-process of WPA2 with KRACK. WPA3 should fix that.
upvoted 1 times
...
fd17639
1 year, 5 months ago
Selected Answer: B
B is correct
upvoted 1 times
...
Philipli308
1 year, 11 months ago
Selected Answer: A
Man-in-the-middle attack should be the person without authentication, they try to collect all the packet of network traffic by the software sniffer and reached the goal.
upvoted 3 times
...
Shabeth
2 years ago
Selected Answer: A
A. Authentication- MITM attacks can be prevented or detected by two means: authentication and tamper detection.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...