which of the following attacks?

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.
This is an example of which of the following attacks?

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.
This is an example of which of the following attacks?

A.
Smurf attack

B.
VLAN hopping

C.
Bluesnarfing

D.
Spear phishing



Leave a Reply 0

Your email address will not be published. Required fields are marked *