Multiple Choice
A malicious user wants to perform an MITM attack on a computer. The computer network configuration is given below: IP: 192.168.1.20 NETMASK: 255.255.255.0 DEFAULT GATEWAY: 192.168.1.254 DHCP: 192.168.1.253 DNS: 192.168.10.10, 192.168.20.10 Which of the following commands should the malicious user execute to perform the MITM attack?
A) arpspoof -c both -r -t 192.168.1.1 192.168.1.20
B) arpspoof -t 192.168.1.20 192.168.1.254
C) arpspoof -c both -t 192.168.1.20 192.168.1.253
D) arpspoof -r -t 192.168.1.253 192.168.1.20
Correct Answer:

Verified
Correct Answer:
Verified
Q32: A penetration tester has successfully exploited a
Q33: If a security consultant comes across a
Q34: A penetration tester has been hired to
Q35: An engineer, who is conducting a penetration
Q36: When negotiating a penetration testing contract with
Q38: Given the following Python script: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1257/.jpg"
Q39: Consider the following PowerShell command: powershell.exe IEX
Q40: A software developer wants to test the
Q41: During a full-scope security assessment, which of
Q42: Which of the following commands starts the