List of questions
Related questions
Question 83 - ECSS discussion
Peter, an attacker aiming to disrupt organizational services, targeted a configuration protocol that issues IP addresses to host systems. To disrupt the issuance of IP addresses. Peter flooded the target server with spoofed MAC addresses so that valid users cannot receive IP addresses to access the network.
Identify the type of attack Peter has performed in the above scenario.
A.
Session hijacking
B.
Ping-of-death attack
C.
ARP spoofing
D.
DHCP starvation attack
Your answer:
0 comments
Sorted by
Leave a comment first