Which statement is true about these threats?

The Company is concerned about Layer 2 security threats. Which statement is true about
these threats?

The Company is concerned about Layer 2 security threats. Which statement is true about
these threats?

A.
MAC spoofing attacks allow an attacking device to receive frames intended for a
different network host.

B.
Port scanners are the most effective defense against dynamic ARP inspection.

C.
MAC spoofing, in conjunction with ARP snooping, is the most effective countermeasure against reconnaissance attacks that use dynamic ARP inspection (DAI) to
determine vulnerable attack points.

D.
Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter
DHCP snooping attacks.

E.
DHCP snooping sends unauthorized replies to DHCP queries.

F.
ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.

G.
None of the other alternatives apply.

Explanation:
First of all, MAC spoofing is not an effective counter-measure against any reconnaissance
attack; it IS an attack! Furthermore, reconnaissance attacks don’t use dynamic ARP
inspection (DAI); DAI is a switch feature used to prevent attacks.



Leave a Reply 0

Your email address will not be published. Required fields are marked *