List of questions
Related questions
Question 69 - 312-50v12 discussion
An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?
A.
He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
B.
He will activate OSPF on the spoofed root bridge.
C.
He will repeat this action so that it escalates to a DoS attack.
D.
He will repeat the same attack against all L2 switches of the network.
Your answer:
0 comments
Sorted by
Leave a comment first