Which item will MOST likely permit an attacker to make a switch function like a hub?

Which item will MOST likely permit an attacker to make a switch function like a hub?

Which item will MOST likely permit an attacker to make a switch function like a hub?

A.
MAC flooding

B.
DNS spoofing

C.
ARP poisoning

D.
DNS poisoning



Leave a Reply 0

Your email address will not be published. Required fields are marked *