A threat actor configures a host with the 802.1Q protocol and forms a trunk with the connected switch. What type of attack is this?

IT Questions BankCategory: CCNA 2 v7A threat actor configures a host with the 802.1Q protocol and forms a trunk with the connected switch. What type of attack is this?

A threat actor configures a host with the 802.1Q protocol and forms a trunk with the connected switch. What type of attack is this?

  • Address spoofing
  • ARP spoofing
  • CDP reconnaissance
  • DHCP starvation
  • STP attack
  • VLAN hopping

Explanation: A threat actor can effectively hop VLANs if the threat actor’s device belongs to the native VLAN and trunks with the switch.

Exam with this question: 10.5.11 Check Your Understanding - LAN Attacks

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments