Describe what ARP poisoning is and how it could be used at a coffee shop to intercept usernames and passwords.
What is ARP?
What is the purpose?
Provide a diagram of a typical ARP attack
Describe 4 methods that can be used to prevent or at least limit the chances of this type of attack from happening in public locales.
What is the difference between ARP spoofing and ARP poisoning?
Given the new normal of working from home, is this type of attack still as important a tool as it was a year ago for example? Why?
Sample Solution