What is the aim of an ARP spoofing attack?
- to fill switch MAC address tables with bogus addresses
- to flood the network with ARP reply broadcasts
- to associate IP addresses to the wrong MAC address
- to overwhelm network hosts with ARP requests
Explique: In an ARP spoofing attack, a malicious host intercepts ARP requests and replies to them so that network hosts will map an IP address to the MAC address of the malicious host.
Más preguntas: CyberOps Associate - Cuestionario del módulo 8: Prueba del protocolo de resolución de direcciones Respuestas
Please login or Register to submit your answer