An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.
This is an example of which of the following attacks?
A.
Smurf attack
B.
VLAN hopping
C.
Bluesnarfing
D.
Spear phishing
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.
This is an example of which of the following attacks?
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.
This is an example of which of the following attacks?
A.
Smurf attack
B.
VLAN hopping
C.
Bluesnarfing
D.
Spear phishing