Posted by: Pdfprep
Post Date: November 20, 2020
Which two statements about STP attacks are true? (Choose two)
A . They can create the opportunity for subsequent man-in-the-middle attacks
B . They can be executed only from a hub
C . The attacker sets up a rogue DHCP server to intercept requests
D . They can be performed only when Cisco Discovery Protocol is running
E . They can be mitigated by disabling ST
G . The attacker sends BPDU messages to become the root bridge.
Answer: EF
Leave a Reply