ECCouncil EC-Council Certified Security Specialist (ECSSv10)Exam ECSS Question # 8 Topic 1 Discussion

ECCouncil EC-Council Certified Security Specialist (ECSSv10)Exam ECSS Question # 8 Topic 1 Discussion

ECSS Exam Topic 1 Question 8 Discussion:
Question #: 8
Topic #: 1

Peter, an attacker aiming to disrupt organizational services, targeted a configuration protocol that issues IP addresses to host systems. To disrupt the issuance of IP addresses. Peter flooded the target server with spoofed MAC addresses so that valid users cannot receive IP addresses to access the network.

Identify the type of attack Peter has performed in the above scenario.


A.

Session hijacking


B.

Ping-of-death attack


C.

ARP spoofing


D.

DHCP starvation attack


Get Premium ECSS Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.