Free CompTIA PenTest+ PT0-002 Practice Question

During a penetration test, you observe that a network device is continuously broadcasting requests to identify the hardware address corresponding to a known network address. Seeking to intercept and alter the communication between this device and another server within the same broadcast domain, which method would be most suitable for inserting yourself into their communication stream?

  • Flooding the network with traffic to prevent legitimate communications from occurring

  • Capturing packets passively to analyze traffic without sending any of your own

  • Deploying an unauthorized DHCP server to reroute traffic through your machine

  • Introducing forged address resolution protocol responses to bind your hardware address with the server's network address

This question's topic:
CompTIA PenTest+ PT0-002 / 
Attacks and Exploits
Your Score:

Check or uncheck an objective to set which questions you will receive.