What is the primary danger presented to the network by rogue routers?
A. switching loops
B a change in the STP topology
C. routing table pollution
D. DNS record pollution
C
Explanation: Hackers can introduce rogue routers into the network and perform a routing table update or exchange with a legitimate company router. Not only can this allow them to learn the routes and general layout of the network, it can also be used to pollute the routing table with incorrect routes that may enhance an attack.
You might also like to view...
________ formats can also be created with the Yes/No data type
Fill in the blank(s) with correct word
How can the creation of too many constraints or rules, such as requiring data, on a field or fields cause challenges for users?
What will be an ideal response?
What happens when you click the Move Chart button in the Location group of the Chart Tools Design tab?
A. The New Chart dialog box opens. B. The New Sheet dialog box opens. C. The Move Sheet dialog box opens. D. The Move Chart dialog box opens.
Zero-day attacks might be stopped by ________ detection.
signature anamoly both anomaly and signature active