New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 237 Topic 24 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 237 Topic 24 Discussion

312-50v13 Exam Topic 24 Question 237 Discussion:
Question #: 237
Topic #: 24

In a large organization, a network security analyst discovered a series of packet captures that seem unusual.

The network operates on a switched Ethernet environment. The security team suspects that an attacker might

be using a sniffer tool. Which technique could the attacker be using to successfully carry out this attack,

considering the switched nature of the network?


A.

The attacker might be compromising physical security to plug into the network directly


B.

The attacker might be implementing MAC flooding to overwhelm the switch's memory


C.

The attacker is probably using a Trojan horse with in-built sniffing capability


D.

The attacker might be using passive sniffing, as it provides significant stealth advantages


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.