What type of attack does an attacker virtually change a device’s burned-in address in an attempt to circumvent access lists and mask the device’s true identity?

In what type of attack does an attacker virtually change a device’s burned-in address in an attempt to circumvent access lists and mask the device’s true identity?If your original MAC address is revealed, a hacker can use it to impersonate you! On many networks (wired or wireless) access is restricted based on MAC address to avoid access to unauthorized devices on the network. So, when you go offline, someone can use your machine’s MAC address and access the network as ‘you’. Reference: http://blog.technitium.com/2011/06/why-you-need-to-change-mac-address.html

Question:

What type of attack does an attacker virtually change a device’s burned-in address in an attempt to circumvent access lists and mask the device’s true identity?

Options:

gratuitous ARP

ARP poisoning

IP spoofing

MAC spoofing

Correct Answer

The Correct Answer for this Question is

MAC spoofing

Leave a Comment