An attacker has connected to an unused VoIP phone port to gain unauthorized access to a
network. This is an example of which of the following attacks?
A.
Smurf attack
B.
VLAN hopping
C.
Bluesnarfing
D.
Spear phishing
Explanation:
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a
network. This is an example of which of the following attacks?
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a
network. This is an example of which of the following attacks?
A.
Smurf attack
B.
VLAN hopping
C.
Bluesnarfing
D.
Spear phishing
Explanation:
How B?
If you look at the other answers you will see B is the most fit. There is no bluetooth so no bluesnarfing is involved. It is not a smurf attack as nothing about ICMP flood is occuring, spear phishing involves email. By connecting to the network the user is closer to VLAN hopping than the other 3 options.
I agree with what Chris said. Also, quality of service has different VLANs set up. There is usually a VLAN just for voice services, so to enter into a VoIP physical interface puts you on one VLAN from which you can see or access other VLAN traffic.