Correct answer: B. ARP cache poisoning
DHCP snooping is a counter measure against attack.
wiki:
In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate the attacker's MAC address with the IP address of another host, such as the default gateway, causing any traffic meant for that IP address to be sent to the attacker instead.
from cert guide - Chapter 4:
ARP Cache Poisoning
Threat actors can attack hosts, switches, and routers connected to your Layer 2 network by
poisoning the ARP caches of systems connected to the subnet and by intercepting traffic
intended for other hosts on the subnet.
ARP cache poisoning
ARP (Address Resolution Protocol) cache poisoning, also known as ARP spoofing, is an attack method that intercepts traffic on a switched network. In an ARP cache poisoning attack, an attacker sends forged ARP messages to associate their MAC address with the IP address of another legitimate device on the network. As a result, traffic meant for the legitimate device is redirected to the attacker's system, allowing them to intercept and potentially modify the traffic.
Correct answer: B
DHCP snooping is a security mechanism used to prevent rogue DHCP (Dynamic Host Configuration Protocol) servers from providing incorrect or malicious IP configuration information to network clients. It does not directly intercept network traffic.
The attack method that intercepts traffic on a switched network is ARP cache poisoning, which is also known as ARP spoofing or ARP poisoning.
In a switched network, each device maintains an ARP cache that maps IP addresses to MAC addresses. When a device needs to communicate with another device on the same network, it looks up the MAC address in its ARP cache and uses that address to send the packet.
In an ARP cache poisoning attack, the attacker sends fake ARP messages to other devices on the network, claiming to be the owner of a particular IP address. This causes the other devices to update their ARP caches with the attacker's MAC address instead of the actual owner's MAC address. As a result, all traffic intended for the owner of that IP address is instead sent to the attacker, who can intercept and manipulate the traffic.
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SXF/native/configuration/guide/swcg/snoodhcp.pdf read this article for why C and not B is correct
The purpose of ARP is to translate between addresses at the data link layer – known as MAC Addresses – and addresses at the network layer, which are typically IP addresses (switch contains routing table), the fix is to enable DHCP snooping.
B is correct
the attacker spoofs Layer 2 MAC addresses to make the devices on a LAN believe that the Layer 2 address of the attacker is the Layer 2 address of its default gateway. This is called ARP poisoning.
Obs:
DHCP snooping is used to prevent rogue DHCP servers on a network.
This section is not available anymore. Please use the main Exam Page.200-201 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
skysoft
Highly Voted 3 years, 5 months agofejec
2 years, 8 months agoASIDIBE
1 year, 4 months agoAhmedAbdalla
Most Recent 7 months, 3 weeks agoWISDOM2080
9 months agoFaio
11 months, 3 weeks agojiri_kurka
1 year, 1 month agodrdecker100
1 year, 3 months agoASIDIBE
1 year, 4 months agoASIDIBE
1 year, 4 months agoASIDIBE
1 year, 5 months agoexamtopicsfhrn2
1 year, 5 months agofyticez
1 year, 7 months agoEng_ahmedyoussef
1 year, 8 months agokyle942
1 year, 8 months agoEntivo
1 year, 9 months agoadodoccletus
1 year, 11 months agoOscar14258
2 years agoRolandoFiee
2 years, 3 months ago