nerdexam
EC-CouncilEC-Council

312-49 · Question #147

312-49 Question #147: Real Exam Question with Answer & Explanation

Sign in or unlock 312-49 to reveal the answer and full explanation for question #147. The question stem and answer options stay visible for context.

Submitted by devops_kid· Apr 18, 2026Network Forensics

Question

Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc. Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?

Options

  • AIP address spoofing
  • BMan-in-the-middle attack
  • CDenial of Service attack
  • DSession sniffing

Unlock 312-49 to see the answer

You've previewed enough free 312-49 questions. Unlock 312-49 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#IP Spoofing#Network Attacks#Impersonation#Network Security
Full 312-49 PracticeBrowse All 312-49 Questions