A malicious user floods a switch with frames hoping to redirect traffic to the user's server. Which of the following attacks is the user MOST likely using?
A. DNS poisoning
B. ARP poisoning
C. Reflection
D. SYN attack
Answer: B. ARP poisoning
You might also like to view...
When a ________ with a form or report is deleted, only that object is deleted, not the actual form or report
A) button B) data type C) tab D) cursor
In the Expression Builder dialog box, the Expression Elements list box displays controls on the object
Indicate whether the statement is true or false
Write SQL statements to do the following:
Assume that the following table is created and stored in your database: Staff (staffNo, name, post, salary, sex, DOB) (a) Increment the salary of managers by 5%; (b) Remove the records of all 'salesmen' from the Staff table; (c) List the Staff table tablespace name, pctfree, and pctused.
If, after making a change that affects every Friday during a project, you further modify individual Fridays, the individual day changes would override the change made to all Fridays.
Answer the following statement true (T) or false (F)