Which of the following attacks are occurring in this scenario?

An attacker has flooded the hardware tables of a switch to forward traffic to the attacker’s IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective.

Which of the following attacks are occurring in this scenario? (Select TWO).
A . DNS poisoning
B . ARP poisoning
C . Man-in-the-middle
D . Ransomware
E . Evil twin
F . Reflective

Answer: B,C

Latest N10-007 Dumps Valid Version with 601 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments