PrepAway - Latest Free Exam Questions & Answers

Which of the following attack mechanisms can the attacker utilize to bypass the identified network security co

While performing surveillance activities an attacker determines that an organization is using
802.1X to secure LAN access. Which of the following attack mechanisms can the attacker utilize
to bypass the identified network security controls?

PrepAway - Latest Free Exam Questions & Answers

A.
MAC spoofing

B.
Pharming

C.
Xmas attack

D.
ARP poisoning

One Comment on “Which of the following attack mechanisms can the attacker utilize to bypass the identified network security co

  1. Lake says:

    Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer’s ARP cache with a forged ARP request and reply packets. This modifies the layer -Ethernet MAC address into the hacker’s known MAC address to monitor it. Because the ARP replies are forged, the target computer unintentionally sends the frames to the hacker’s computer first instead of sending it to the original destination. As a result, both the user’s data and privacy are compromised. An effective ARP poisoning attempt is undetectable to the user.
    ARP poisoning is also known as ARP cache poisoning or ARP poison routing (APR).
    Limiting the MAC addresses that can connect to a network port is not used to prevent ARP poisoning.




    0



    0

Leave a Reply