اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 85 من 90

كل الأسئلة

An attacker with access to the inside network of a small company launches a successful STP (Spanning Tree Protocol) manipulation attack. What will the attacker MOST likely do next?

الخيارات

  • A Create a SPAN entry on the spoofed root bridge and redirect traffic to the attacker’s computer.
  • B Activate OSPF on the spoofed root bridge.
  • C Repeat this action so that it escalates to a DoS attack.
  • D Repeat the same attack against all Layer 2 switches of the network.

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.