A malicious user floods a switch with frames hoping to redirect traffic to the user's server. Which of the following attacks is the user MOST likely using?

A. DNS poisoning
B. ARP poisoning
C. Reflection
D. SYN attack


Answer: B. ARP poisoning

Computer Science & Information Technology

You might also like to view...

When a ________ with a form or report is deleted, only that object is deleted, not the actual form or report

A) button B) data type C) tab D) cursor

Computer Science & Information Technology

In the Expression Builder dialog box, the Expression Elements list box displays controls on the object

Indicate whether the statement is true or false

Computer Science & Information Technology

Write SQL statements to do the following:

Assume that the following table is created and stored in your database: Staff (staffNo, name, post, salary, sex, DOB) (a) Increment the salary of managers by 5%; (b) Remove the records of all 'salesmen' from the Staff table; (c) List the Staff table tablespace name, pctfree, and pctused.

Computer Science & Information Technology

If, after making a change that affects every Friday during a project, you further modify individual Fridays, the individual day changes would override the change made to all Fridays.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology