PrepAway - Latest Free Exam Questions & Answers

which of the following attacks?

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.
This is an example of which of the following attacks? to traffic on other VLANs that would normally not be accessible.

PrepAway - Latest Free Exam Questions & Answers

A.
Smurf attack

B.
VLAN hopping

C.
Blue snarfing

D.
Spear phishing

Explanation:
The VoIP phone port can be used to attack a VLAN on the local network.
VLAN hopping is a computer security exploit, a method of attacking networked resources on a Virtual LAN
(VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access


Leave a Reply