While performing surveillance activities an attacker determines that an organization is using 802.1X to secure LAN access. Which of the following attack
mechanisms can the attacker utilize to bypass the identified network security controls?
A.
MAC spoofing
B.
Pharming
C.
Xmas attack
D.
ARP poisoning