A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee's computer. This type of attack is an example of:

A. ARP cache poisoning
B. IP spoofing
C. amplified DNS attack
D. evil twin

Answer: A. ARP cache poisoning

Computer Science & Information Technology

You might also like to view...

Identify the three most probable threats to a computing system in an office with fewer than 10 employees. That is, identify the three vulnerabilities most likely to be exploited. Estimate the number of times each vulnerability is exploited per year. Justify your estimate.

What will be an ideal response?

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Any global declarations or definitions can be placed in a namespace. 2. The include statement, #include “file.h” looks first in the system defined directory for file.h then, if the file is not found, it looks in the user’s current directory. (Windows PC and Macintosh users sometimes use “folder” for what I call “directory”.) 3. The include statement, #include looks in the system defined directory for the file, file.h. (Windows PC and Macintosh users sometimes use “folder” for what I call “directory”.) 4. A namespace is a collection of name definitions such as class definitions, variable definitions and function definitions used to permit the same name, or names, to be used both in a library and in your own code. 5. In C++, a compilation unit is a class or function.

Computer Science & Information Technology