Which is an example of an STP attack?
- A threat actor changes the MAC address of the threat actor’s device to the MAC address of the default gateway.
- A threat actor configures a host with the 802.1Q protocol and forms a trunk with the connected switch.
- A threat actor discovers the IOS version and IP addresses of the local switch.
- A threat actor leases all the available IP addresses on a subnet to deny legitimate clients DHCP resources.
- A threat actor sends a BPDU message with priority 0.
- A threat actor sends a message that causes all other devices to believe the MAC address of the threat actor’s device is the default gateway.
Explanation: A threat actor sending BPDU messages with a priority of 0 is trying to become the root bridge in the STP topology.
Exam with this question: 10.6.2 Module Quiz - LAN Security Concepts
Please login or Register to submit your answer