What will he do next?
An attacker with access to the inside network of a small company launches a successful STP manipulation attack.
What will he do next?
A . He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
B. He will activate OSPF on the spoofed root bridge.
C. He will repeat this action so that it escalates to a DoS attack.
D. He will repeat the same attack against all L2 switches of the network.
Answer: A
Latest 312-50v12 Dumps Valid Version with 503 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments