A threat actor configures a host with the 802.1Q protocol and forms a trunk with the connected switch. What type of attack is this?
- Address spoofing
- ARP spoofing
- CDP reconnaissance
- DHCP starvation
- STP attack
- VLAN hopping
Explanation: A threat actor can effectively hop VLANs if the threat actor’s device belongs to the native VLAN and trunks with the switch.
Exam with this question: 10.5.11 Check Your Understanding - LAN Attacks
Please login or Register to submit your answer