Why would an attacker want to spoof a MAC address?
- so that the attacker can capture traffic from multiple VLANs rather than from just the VLAN that is assigned to the port to which the attacker device is attached
- so that a switch on the LAN will start forwarding frames to the attacker instead of to the legitimate host
- so that a switch on the LAN will start forwarding all frames toward the device that is under control of the attacker (that can then capture the LAN traffic)
- so that the attacker can launch another type of attack in order to gain access to the switch
Explanation: MAC address spoofing is used to bypass security measures by allowing an attacker to impersonate a legitimate host device, usually for the purpose of collecting network traffic.
Exam with this question: Checkpoint Exam: Threats and Attacks Group Exam
Exam with this question: Endpoint Security (ESec) Final Exam Answers (Course Final)
Please login or Register to submit your answer