In what type of attack does an attacker virtually change a device’s burned-in address in an attempt to circumvent access lists and mask the device’s true identity?

Posted by: Pdfprep Category: 210-260 Tags: , ,

In what type of attack does an attacker virtually change a device’s burned-in address in an attempt to circumvent access lists and mask the device’s true identity?
A . gratuitous ARP
B . ARP poisoning
C . IP spoofing
D . MAC spoofing

Answer: D

Explanation:

If a switch receives an inferior BPDU, nothing changes. Receiving a superior BPDU will kick off a reconvergence of the STP topology. So the rogue switch may become a root bridge.

Source: http://www.networkpcworld.com/what-are-inferior-and-superior-bpdus-of-stp/

Leave a Reply

Your email address will not be published.