Which of the following will MOST likely allow an attacker to make a switch function like a hub?
A.
MAC flooding
B.
ARP poisoning
C.
DNS poisoning
D.
DNS spoofing
Which of the following will MOST likely allow an attacker to make a switch function like a hub?
Which of the following will MOST likely allow an attacker to make a switch function like a hub?
A.
MAC flooding
B.
ARP poisoning
C.
DNS poisoning
D.
DNS spoofing