which of the following attacks? seenagape 9 years ago An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.This is an example of which of the following attacks? A. Smurf attack B. VLAN hopping C. Bluesnarfing D. Spear phishing ← Previous question Next question →