ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 83 - ECSS discussion

Report
Export

Peter, an attacker aiming to disrupt organizational services, targeted a configuration protocol that issues IP addresses to host systems. To disrupt the issuance of IP addresses. Peter flooded the target server with spoofed MAC addresses so that valid users cannot receive IP addresses to access the network.

Identify the type of attack Peter has performed in the above scenario.

A.

Session hijacking

Answers
A.

Session hijacking

B.

Ping-of-death attack

Answers
B.

Ping-of-death attack

C.

ARP spoofing

Answers
C.

ARP spoofing

D.

DHCP starvation attack

Answers
D.

DHCP starvation attack

Suggested answer: D

Explanation:

Peter has performed aDHCP starvation attackin the given scenario. In this attack, the attacker floods the target DHCP server withspoofed MAC addresses, depleting the pool of available IP addresses.As a result, legitimate users cannot obtain IP addresses via DHCP, causing aDenial of Service (DoS)attack12.Additionally, the attacker could set up a rogue DHCP server to assign IP addresses to legitimate users, potentially leading to aMan-in-the-Middle (MITM)attack1. The correct answer isD.5 -> 1 -> 6 -> 2 -> 3 -> 41.

asked 24/10/2024
Oleksandr Kondratchuk
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first