Which two statements describe DHCP spoofing attacks?

Which two statements describe DHCP spoofing attacks? (Choose Two.)
A. They can modify the flow of traffic in transit.
B. They can access most network devices.
C. They can physically modify the network gateway.
D. They are used to perform man-in-the-middle attacks.
E. They protect the identity of the attacker by masking the DHCP address.
F. They use ARP poisoning.

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.