Which item will MOST likely permit an attacker to make a switch function like a hub?
A.
MAC flooding
B.
DNS spoofing
C.
ARP poisoning
D.
DNS poisoning
Which item will MOST likely permit an attacker to make a switch function like a hub?
Which item will MOST likely permit an attacker to make a switch function like a hub?
A.
MAC flooding
B.
DNS spoofing
C.
ARP poisoning
D.
DNS poisoning