While performing surveillance activities an attacker determines that an organization is using 802.1X to
secure LAN access. Which of the following attack mechanisms can the attacker utilize to bypass the
identified network security controls?

A.
MAC spoofing
B.
Pharming
C.
Xmas attack
D.
ARP poisoning
Mac Spoofing – the port authenticaiton is based upon MAC Adress
0
0
Agreed MAC spoofing
0
0
D should be correct in my opinion. MAC spoof should be used for port security violation policy
0
0
With ARP spoofing (also known as ARP poisoning), the MAC address of the data is faked. By faking this value, it is possible to make it look as if the data came from a network that it did not. This can be used to gain access to the network.
0
0