Which of the following attacks are occurring in this scenario?

Posted by: Pdfprep Category: N10-007 Tags: , ,

An attacker has flooded the hardware tables of a switch to forward traffic to the attacker’s IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective.

Which of the following attacks are occurring in this scenario? (Select TWO).
A . DNS poisoning
B . ARP poisoning
C . Man-in-the-middle
D . Ransomware
E . Evil twin
F . Reflective

Answer: B,C

Leave a Reply

Your email address will not be published.