PdfPrep.com

Which of the following types of attack is being used when an attacker responds by sending the MAC address of the attacking machine to resolve the MAC to IP address of a valid server?

Which of the following types of attack is being used when an attacker responds by sending the MAC address of the attacking machine to resolve the MAC to IP address of a valid server?
A . Session hijacking
B . IP spoofing
C . Evil twin
D . ARP poisoning

Answer: D

Exit mobile version