While performing surveillance activities, an attacker determines that an organization is using 802.1X to secure
LAN access. Which of the following attack mechanisms can the attacker utilize to bypass the identified network
security controls?
A.
MAC spoofing
B.
Pharming
C.
Xmas attack
D.
ARP poisoning
Explanation:
802.1x restricts access based on MAC addresses. However, MAC addresses can be spoofed.