Question: 80
Which of the following statements best illustrates the uniqu...
An e-commerce company’s IT team is alerted by their intrusion detection system (IDS) about unusual ARP traffic on the network. Upon investigation, they find that a malicious device is impersonating the gateway by sending unsolicited ARP replies to users. Some users report intermittent connectivity issues, and a network scan reveals duplicate MAC addresses in the ARP cache of multiple devices.
Which IMMEDIATE action should the IT team take to minimize the impact of the attack without disrupting legitimate user activity?
Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! 🙏
No comments yet. Be the first to comment!