A workstation puts out a network request to locate another system. Joe, a hacker on the network, responds before the real system does, and he tricks the workstation into communicating with him.
Which of the following BEST describes what occurred?
A . The hacker used a race condition.
B . The hacker used a pass-the-hash attack.
C . The hacker-exploited improper key management.
D . The hacker exploited weak switch configuration.
Answer: D