Security analysts are conducting an investigation of an attack that occurred inside the organization's network. An attacker was able to collect network traffic between workstations throughout the network. The analysts review the following logs:
The Layer 2 address table has hundreds of entries similar to the ones above. Which of the following attacks has MOST likely occurred?
rodwave
Highly Voted 2 years, 4 months agoMumbo
Highly Voted 1 year, 4 months agoKheeze1
1 year, 3 months agoPesos
1 year agoslackbot
Most Recent 5 days, 5 hours agoProtract8593
1 year, 7 months agoYawannawanka
1 year, 10 months agofouserd
1 year, 11 months agoRonWonkers
2 years, 5 months ago_Tyler_
2 years, 6 months agoScottT
2 years, 6 months agoYuyuyakuza
2 years, 6 months ago