exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 83 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 83
Topic #: 1
[All 312-50v11 Questions]

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?

  • A. He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
  • B. He will activate OSPF on the spoofed root bridge.
  • C. He will repeat this action so that it escalates to a DoS attack.
  • D. He will repeat the same attack against all L2 switches of the network.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
czarul79
Highly Voted 2 years, 2 months ago
A is correct answer. In an STP manipulation attack, an attacker connects to a switch port and either directly themselves, or through the use of a rogue switch, attempts to manipulate Spanning Tree Protocol (STP) parameters to become the root bridge. Because the root bridge is responsible for calculating the spanning tree from topology changes advertised by non-root bridges, attackers see a variety of frames that they would normally not see.
upvoted 20 times
...
Daniel8660
Most Recent 6 months, 3 weeks ago
Selected Answer: A
STP Attack Attackers connect a rogue switch into the network to change the operations of the STP protocol and sniff all the network traffic. (P.1167/1151)
upvoted 3 times
...
gokhansah1n
1 year, 5 months ago
How can attacker create an entry in the config of switch and provide himself a mirror traffic with span port by just sending root election bpdu? Creating an entry is sort of command injection type of attack. STP bpdu packet causes to re-elect root bridge to determine which interfaces of switches would be open which of them would not.
upvoted 1 times
...
martco
1 year, 5 months ago
both A and C are plausible, unfair question imo make a SPAN config on his rogue spoofer switch to create the mirror port he needs to monitor the traffic now passing thru OR just be destructive by looping thru the STP attack in order to cause topology recalcs and storm
upvoted 3 times
...
Mr_Gray
1 year, 7 months ago
fair but why could it not be C based on this An STP attack involves an attacker spoofing the root bridge in the topology. The attacker broadcasts out an STP configuration/topology change BPDU in an attempt to force an STP recalculation. The BPDU sent out announces that the attacker's system has a lower bridge priority. The attacker can then see a variety of frames forwarded from other switches to it. STP recalculation may also cause a denial-of-service (DoS) condition on the network by causing an interruption of 30 to 45 seconds each time the root bridge changes. Figure 14-4 shows an attacker using STP network topology changes to force its host to be elected as the root bridge.
upvoted 1 times
...
ANDRESCB1988
1 year, 9 months ago
correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago