exam questions

Exam 312-50v10 All Questions

View all questions & answers for the 312-50v10 exam

Exam 312-50v10 topic 1 question 139 discussion

Actual exam question from ECCouncil's 312-50v10
Question #: 139
Topic #: 1
[All 312-50v10 Questions]

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?

  • A. He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
  • B. He will activate OSPF on the spoofed root bridge.
  • C. He will repeat this action so that it escalates to a DoS attack.
  • D. He will repeat the same attack against all L2 switches of the network.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
TrendMicroDLPSSucks
9 months, 4 weeks ago
In an STP manipulation attack, an attacker connects to a switch port and either directly themselves, or through the use of a rogue switch, attempts to manipulate Spanning Tree Protocol (STP) parameters to become the root bridge. Because the root bridge is responsible for calculating the spanning tree from topology changes advertised by non-root bridges, attackers see a variety of frames that they would normally not see.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...