Which two statements describe DHCP spoofing attacks?

Which two statements describe DHCP spoofing attacks? (Choose two)
A. They can access most network devices.
B. They can physically modify the network gateway
C. They protect the identity of the attacker by masking the DHCP address
D. They can modify the flow of traffic in transit
E. They are used to perform man-in-middle attacks

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.