List of questions
Related questions
Question 554 - 312-50v12 discussion
In a large organization, a network security analyst discovered a series of packet captures that seem unusual.
The network operates on a switched Ethernet environment. The security team suspects that an attacker might be using a sniffer tool. Which technique could the attacker be using to successfully carry out this attack, considering the switched nature of the network?
A.
The attacker might be compromising physical security to plug into the network directly
B.
The attacker might be implementing MAC flooding to overwhelm the switch's memory
C.
The attacker is probably using a Trojan horse with in-built sniffing capability
D.
The attacker might be using passive sniffing, as it provides significant stealth advantages
Your answer:
0 comments
Sorted by
Leave a comment first