PrepAway - Latest Free Exam Questions & Answers

which of the following attacks?

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a
network. This is an example of which of the following attacks?

PrepAway - Latest Free Exam Questions & Answers

A.
Smurf attack

B.
VLAN hopping

C.
Bluesnarfing

D.
Spear phishing

Explanation:

3 Comments on “which of the following attacks?

    1. Chris says:

      If you look at the other answers you will see B is the most fit. There is no bluetooth so no bluesnarfing is involved. It is not a smurf attack as nothing about ICMP flood is occuring, spear phishing involves email. By connecting to the network the user is closer to VLAN hopping than the other 3 options.




      0



      0
    2. JaxMadHatter says:

      I agree with what Chris said. Also, quality of service has different VLANs set up. There is usually a VLAN just for voice services, so to enter into a VoIP physical interface puts you on one VLAN from which you can see or access other VLAN traffic.




      0



      0

Leave a Reply