PdfPrep.com

Which of the following attacks are occurring in this scenario?

An attacker has flooded the hardware tables of a switch to forward traffic to the attacker’s IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective.

Which of the following attacks are occurring in this scenario? (Select TWO).
A . DNS poisoning
B . ARP poisoning
C . Man-in-the-middle
D . Ransomware
E . Evil twin
F . Reflective

Answer: B,C

Exit mobile version