Multiple Choice
An attacker has flooded the hardware tables of a switch to forward traffic to the attacker's IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective. Which of the following attacks are occurring in this scenario? (Choose two.)
A) DNS poisoning
B) ARP poisoning
C) Man-in-the-middle
D) Ransomware
E) Evil twin
F) Reflective
Correct Answer:

Verified
Correct Answer:
Verified
Q536: A technician needs to add ten additional
Q537: An AP is configured to authenticate clients
Q538: A network engineer wants to implement a
Q539: A technician is sent to troubleshoot a
Q540: A new network technician is responsible for
Q542: During a weekend event, several people reported
Q543: A network administrator needs to access a
Q544: A technician discovers that multiple switches require
Q545: A user is reporting poor network performance.
Q546: A network engineer at a large company