Maintenance workers find an active network switch hidden above a dropped-ceiling tile in the
CEO’s office with various connected cables from the office. Which of the following describes the
type of attack that was occurring?
A.
Spear phishing
B.
Packet sniffing
C.
Impersonation
D.
MAC flooding