PdfPrep.com

Which two statements about STP attacks are true? (Choose two)

Which two statements about STP attacks are true? (Choose two)
A . They can create the opportunity for subsequent man-in-the-middle attacks
B . They can be executed only from a hub
C . The attacker sets up a rogue DHCP server to intercept requests
D . They can be performed only when Cisco Discovery Protocol is running
E . They can be mitigated by disabling ST
G . The attacker sends BPDU messages to become the root bridge.

Answer: EF

Exit mobile version