An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an example of which of the following attacks?
A. Smurf attack
B. VLAN hopping
C. Bluesnarfing
D. Spear phishing
Answer: B. VLAN hopping
Computer Science & Information Technology
You might also like to view...
A company's ________ database is the database used to record daily transactions
Fill in the blank(s) with correct word
Computer Science & Information Technology
To indicate a range, include a dash between the two cell references
Indicate whether the statement is true or false
Computer Science & Information Technology
Name three ways to remove background noise from a clip
What will be an ideal response?
Computer Science & Information Technology
A software package that can be used by many different types of organizations is called a(n) _____.
A. vertical application B. symmetric application C. horizontal application D. asymmetric application
Computer Science & Information Technology