What will he do next?

An attacker with access to the inside network of a small company launches a successful STP manipulation attack.

What will he do next?
A . He will create a SPAN entry on the spoofed root bridge and redirect traffic to his
computer.

B . He will activate OSPF on the spoofed root bridge.
C . He will repeat this action so that it escalates to a DoS attack.
D . He will repeat the same attack against all L2 switches of the network.

Answer: A

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments