Which scenario best describes an attack where a perpetrator exploits network device misconfigurations to bypass segmentation controls?
A perpetrator modifies switch configurations to transmit data to areas typically restricted.
An individual floods the network with superfluous requests, blocking regular traffic and disrupting user connectivity.
A fraudster tampers with the domain name system settings to reroute users to malevolent sites.
A criminal spoofs address resolution protocols to intercept or redirect communications within the network.