What attack technique can be used to force user traffic through an attacking device, causing a man-in-the-middle attack?

What attack technique can be used to force user traffic through an attacking device, causing a man-in-the-middle attack?
A. VLAN hopping
B. DHCP spoofing
C. Rogue device
D. MAC flooding

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.