Which of the following is an attack where threat actors can attack hosts, switches, and routers connected to your Layer 2 network by poisoning the ARP caches of systems connected to the subnet and by intercepting traffic intended for other hosts on the subnet?

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which of the following is an attack where threat actors can attack hosts, switches, and routers connected to your Layer 2 network by poisoning the ARP caches of systems connected to the subnet and by intercepting traffic intended for other hosts on the subnet?
A . ARP cache injection
B . ARP cache poisoning
C . DHCP snooping
D . ARP snooping

Answer: B

Leave a Reply

Your email address will not be published.