Which three statements describe DHCP spoofing attacks?

Which three statements describe DHCP spoofing attacks? (Choose three.)

Which three statements describe DHCP spoofing attacks? (Choose three.)

A.
They can modify traffic in transit.

B.
They are used to perform man-in-the-middle attacks.

C.
They use ARP poisoning.

D.
They can access most network devices.

E.
They protect the identity of the attacker by masking the DHCP address.

F.
They are can physically modify the network gateway.



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Ss

KorXo

KorXo

Nice resource, very clearly explained

Spoonman

Spoonman

But it doesn’t quite explain how ARP Poisoning is used? It just explains what can happen if a rogue DHCP server is the first to reply to a DHCP Discover.
Can someone elaborate on where ARP Poisoning comes into the picture?