Notifications
Clear all
Topic starter
An organization's network administrator uncovered a rogue device on the network that is emulating the charactenstics of a switch. The device is trunking protocols and inserting tagging va
the flow of traffic at the data link layer
Which of the following BEST describes this attack?
- A . VLAN hopping
B. Injection attack
C. Spoofing
D. DNS pharming
Suggested Answer: A
Posted : 02/01/2023 8:20 pm