An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an example of which of the following attacks?
A. Smurf attack
B. VLAN hopping
C. Bluesnarfing
D. Spear phishing
Explanation:
3 Comments on “which of the following attacks?”
ITHerosays:
How B?
0
0
Chrissays:
If you look at the other answers you will see B is the most fit. There is no bluetooth so no bluesnarfing is involved. It is not a smurf attack as nothing about ICMP flood is occuring, spear phishing involves email. By connecting to the network the user is closer to VLAN hopping than the other 3 options.
0
0
JaxMadHattersays:
I agree with what Chris said. Also, quality of service has different VLANs set up. There is usually a VLAN just for voice services, so to enter into a VoIP physical interface puts you on one VLAN from which you can see or access other VLAN traffic.
How B?
0
0
If you look at the other answers you will see B is the most fit. There is no bluetooth so no bluesnarfing is involved. It is not a smurf attack as nothing about ICMP flood is occuring, spear phishing involves email. By connecting to the network the user is closer to VLAN hopping than the other 3 options.
0
0
I agree with what Chris said. Also, quality of service has different VLANs set up. There is usually a VLAN just for voice services, so to enter into a VoIP physical interface puts you on one VLAN from which you can see or access other VLAN traffic.
0
0