which of the following attacks?

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a
network. This is an example of which of the following attacks?

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a
network. This is an example of which of the following attacks?

A.
Smurf attack

B.
VLAN hopping

C.
Bluesnarfing

D.
Spear phishing

Explanation:



Leave a Reply 3

Your email address will not be published. Required fields are marked *


ITHero

ITHero

How B?

Chris

Chris

If you look at the other answers you will see B is the most fit. There is no bluetooth so no bluesnarfing is involved. It is not a smurf attack as nothing about ICMP flood is occuring, spear phishing involves email. By connecting to the network the user is closer to VLAN hopping than the other 3 options.

JaxMadHatter

JaxMadHatter

I agree with what Chris said. Also, quality of service has different VLANs set up. There is usually a VLAN just for voice services, so to enter into a VoIP physical interface puts you on one VLAN from which you can see or access other VLAN traffic.