Certified Ethical Hacker 312-50v10 – Question139

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?


A.
He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
B. He will activate OSPF on the spoofed root bridge.
C. He will repeat this action so that it escalates to a DoS attack.
D. He will repeat the same attack against all L2 switches of the network.

Correct Answer: A