Posted by: Pdfprep
Post Date: March 14, 2021
An attacker has flooded the hardware tables of a switch to forward traffic to the attacker’s IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective.
Which of the following attacks are occurring in this scenario? (Select TWO).
A . DNS poisoning
B . ARP poisoning
C . Man-in-the-middle
D . Ransomware
E . Evil twin
F . Reflective
Answer: B,C
Leave a Reply