Paul has just finished setting up his wireless network and has enabled numerous security features such as changing the default SSID, enabling WPA encryption and enabling MAC filtering on his wireless router. Paul notices that when he uses his wireless connection, the speed is sometimes 54 Mbps and sometimes it is 24Mbps or less. Paul connects to his wireless router’s management utility and notices that a machine with an unfamiliar name is connected through his wireless connection. He checks the router’s logs and notices that the unfamiliar machine has the same MAC address as his laptop.
What is Paul seeing here?
A. Macof
B. ARP spoofing
C. DNS spoofing
D. MAC spoofing
Related Course
Certified Ethical Hacker v9
CEH v9 Question of the Week Series
- CEH v9 Question of the Week: Retina Scanners
- CEH v9 Question of the Week: Employee Behavior
- CEH v9 Question of the Week: CVE-2007-2447
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Web Application Penetration Testing
- CEH v9 Question of the Week: iptables
- CEH v9 Question of the Week: Examine Streams of Packets
- CEH v9 Question of the Week: Scans
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Standard Risk Assessment
- CEH v9 Question of the Week: Penetration Testing
- CEH v9 Question of the Week: SMB Over TCP/IP
- CEH v9 Question of the Week: Block Cipher
- CEH v9 Question of the Week: Prevent Future DoS Attacks
- CEH v9 Question of the Week: Same MAC Address