Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Which is not a way to carry out a "Man-in-the-middle" attack? (select the best answer)
DNS spoofing
Brute Force Attack
Port stealing
STP mangling
ICMP redirection
The goal of a MITM (MitM, or MITMA) attack is to gain a position logically between the two target endpoints. Any of the following can be used to gain that position: DNS cache positioning, setting up a malicious router in a public network (I.E. MyStarbucksWifi could be setup for connecting users to the real StarBucks Wifi), ARP spoofing, DNS spoofing, STP mangling, port stealing, DHCP spoofing, ICMP redirection, traffic tunneling, route mangling, etc. Even though a successful brute force attack would allow access to the desired resource/network and that could be used to setup a MitM attack. The main goal of a Brute Force attack is to obtain the credentials to gain access. Hence, this is the best answer from the provided options.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.