Why would an attacker want to spoof a MAC address?
- so that the attacker can capture traffic from multiple VLANs rather than from just the VLAN that is assigned to the port to which the attacker device is attached
- so that a switch on the LAN will start forwarding all frames toward the device that is under control of the attacker (that can then capture the LAN traffic)
- so that a switch on the LAN will start forwarding frames to the attacker instead of to the legitimate host
- so that the attacker can launch another type of attack in order to gain access to the switch
Explique: MAC address spoofing is used to bypass security measures by allowing an attacker to impersonate a legitimate host device, usually for the purpose of collecting network traffic.
Más preguntas: CyberOps Associate - Cuestionario del módulo 8: Prueba del protocolo de resolución de direcciones Respuestas
Please login or Register to submit your answer