Which of the following attack mechanisms can the attack…

While performing surveillance activities, an attacker determines that an organization is using 802.1X to secure
LAN access. Which of the following attack mechanisms can the attacker utilize to bypass the identified network
security controls?

While performing surveillance activities, an attacker determines that an organization is using 802.1X to secure
LAN access. Which of the following attack mechanisms can the attacker utilize to bypass the identified network
security controls?

A.
MAC spoofing

B.
Pharming

C.
Xmas attack

D.
ARP poisoning

Explanation:
802.1x restricts access based on MAC addresses. However, MAC addresses can be spoofed.



Leave a Reply 0

Your email address will not be published. Required fields are marked *