312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 18


Robin, a professional hacker, targeted an organization’s network to sniff all the traffic. During this process, Robin plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network.

What is the attack performed by Robin in the above scenario?

Show Answer
Correct Answer: B

The attack described involves Robin plugging in a rogue switch with a lower priority to make it the root bridge of the network. This type of attack leverages the Spanning Tree Protocol (STP), which is used to prevent network loops by determining the most efficient path for data to travel. By becoming the root bridge, Robin can direct network traffic through his rogue switch, enabling the sniffing of all traffic. This scenario fits the description of an STP attack.

Discussion

6 comments
Sign in to comment
eli117Option: B
Apr 4, 2023

B. STP attack (Spanning Tree Protocol attack) This is a type of STP attack, which manipulates the Spanning Tree Protocol to create a loop in the network topology, allowing the attacker to intercept and inspect network traffic.

[Removed]Option: B
Dec 16, 2023

B. STP attack, This was a question for me when I took the exam on 13 Dec 2023

Karthikeyan017
Jun 22, 2024

Thanks

jeremy13Option: B
Apr 10, 2023

B. STP attack

sringanOption: B
Oct 10, 2023

Confirmed in ceh v12 official book page no: 1282

YonGCybeR
Nov 5, 2023

page no 864 isn't?

insaniuntOption: B
Nov 26, 2023

B. STP attack

desertlotus1211Option: B
Apr 10, 2024

I have no choice but to beleive Answer B is correct....HOWEVER, this is not an 'attack'. She didn't create an STP loop, She added a device to claim root bridge status.