Spring Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ac4s65

During a red team engagement at a law firm in Dallas, ethical hacker Sarah connects...

During a red team engagement at a law firm in Dallas, ethical hacker Sarah connects a compromised workstation to a core switch. Within minutes, the switch begins experiencing instability, and multiple VLANs report traffic leakage across isolated departments. Sarah observes that her machine is now receiving packets not originally destined for it, giving her visibility into multiple active sessions. Logs show the switch ' s CAM table was overwhelmed during the attack.

Which sniffing technique did Sarah most likely use?

A.

DNS Poisoning

B.

VLAN Hopping

C.

ARP Poisoning

D.

MAC Flooding

312-50v13 PDF/Engine
  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions
buy now 312-50v13 pdf
Get 65% Discount on All Products, Use Coupon: "ac4s65"