An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an example of which of the following attacks?

A. Smurf attack
B. VLAN hopping
C. Bluesnarfing
D. Spear phishing


Answer: B. VLAN hopping

Computer Science & Information Technology

You might also like to view...

A company's ________ database is the database used to record daily transactions

Fill in the blank(s) with correct word

Computer Science & Information Technology

To indicate a range, include a dash between the two cell references

Indicate whether the statement is true or false

Computer Science & Information Technology

Name three ways to remove background noise from a clip

What will be an ideal response?

Computer Science & Information Technology

A software package that can be used by many different types of organizations is called a(n) _____.

A. vertical application B. symmetric application C. horizontal application D. asymmetric application

Computer Science & Information Technology