An attacker with access to the inside network of a small company launches a successful STP manipulation attack.
What will he do next?
A . He will create a SPAN entry on the spoofed root bridge and redirect traffic to his
computer.
B . He will activate OSPF on the spoofed root bridge.
C . He will repeat this action so that it escalates to a DoS attack.
D . He will repeat the same attack against all L2 switches of the network.
Answer: A
Latest 312-50v11 Dumps Valid Version with 432 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund