This is an example of which of the following attacks?

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.

This is an example of which of the following attacks?
A . Smurf attack
B . VLAN hopping
C . Bluesnarfing
D . Spear phishing

Answer: B

Explanation:

The VoIP phone port can be used to attack a VLAN on the local network.

VLAN hopping is a computer security exploit, a method of attacking networked resources on a Virtual LAN (VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments