Notifications
Clear all
Topic starter
19/09/2022 7:16 pm
An organization's network administrator uncovered a rogue device on the network that is emulating the charactenstics of a switch. The device is trucking protocols and inserting tagging va
the flow of traffic at the data link layer
Which of the following BEST describes this attack?
- A . VLAN hopping
- B . Injection attack
- C . Spoofing
- D . DNS pharming
Suggested Answer: A