Exam 210-260 | Question id=627 | Content and Endpoint Security |
Which statements describe DHCP spoofing attacks?
A. |
They can modify traffic in transit. | |
B. |
They are used to perform man-in-the-middle attacks. | |
C. |
They use ARP poisoning. | |
D. |
They can access most network devices. | |
E. |
They protect the identity of the attacker by masking the DHCP address. | |
F. |
They are can physically modify the network gateway. |