Which of the following BEST describes what occurred?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

A workstation puts out a network request to locate another system. Joe, a hacker on the network, responds before the real system does, and he tricks the workstation into communicating with him.

Which of the following BEST describes what occurred?
A . The hacker used a race condition.
B . The hacker used a pass-the-hash attack.
C . The hacker-exploited improper key management.
D . The hacker exploited weak switch configuration.

Answer: D

Leave a Reply

Your email address will not be published.