which of the following attacks?

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.
This is an example of which of the following attacks? to traffic on other VLANs that would normally not be accessible.

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.
This is an example of which of the following attacks? to traffic on other VLANs that would normally not be accessible.

A.
Smurf attack

B.
VLAN hopping

C.
Blue snarfing

D.
Spear phishing

Explanation:
The VoIP phone port can be used to attack a VLAN on the local network.
VLAN hopping is a computer security exploit, a method of attacking networked resources on a Virtual LAN
(VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access



Leave a Reply 0

Your email address will not be published. Required fields are marked *