Which of the following attack mechanisms can the attacker utilize to bypass the identified network security controls?

While performing surveillance activities an attacker determines that an organization is using 802.1X to
secure LAN access. Which of the following attack mechanisms can the attacker utilize to bypass the
identified network security controls?

While performing surveillance activities an attacker determines that an organization is using 802.1X to
secure LAN access. Which of the following attack mechanisms can the attacker utilize to bypass the
identified network security controls?

A.
MAC spoofing

B.
Pharming

C.
Xmas attack

D.
ARP poisoning



Leave a Reply 4

Your email address will not be published. Required fields are marked *

13 − eight =


Fade

Fade

Mac Spoofing – the port authenticaiton is based upon MAC Adress

Paul

Paul

Agreed MAC spoofing

Cosmin

Cosmin

D should be correct in my opinion. MAC spoof should be used for port security violation policy

Mike

Mike

With ARP spoofing (also known as ARP poisoning), the MAC address of the data is faked. By faking this value, it is possible to make it look as if the data came from a network that it did not. This can be used to gain access to the network.