A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee's computer. This type of attack is an example of:
A. ARP cache poisoning
B. IP spoofing
C. amplified DNS attack
D. evil twin
Answer: A. ARP cache poisoning
You might also like to view...
Identify the three most probable threats to a computing system in an office with fewer than 10 employees. That is, identify the three vulnerabilities most likely to be exploited. Estimate the number of times each vulnerability is exploited per year. Justify your estimate.
What will be an ideal response?
Answer the following statements true (T) or false (F)
1. Any global declarations or definitions can be placed in a namespace.
2. The include statement, #include “file.h” looks first in the system defined
directory for file.h then, if the file is not found, it looks in the user’s current
directory. (Windows PC and Macintosh users sometimes use “folder” for what I call
“directory”.)
3. The include statement, #include