Notifications
Clear all
Topic starter
09/07/2022 4:44 pm
Which of the following BEST describes a VLAN hopping attack?
- A . An attacker gains unauthorized access to a network by overflowing the CAM table.
- B . An attacker gains unauthorized access to a network by placing a rogue AP on the network.
- C . An attacker gains unauthorized access to a network by using double-tagged packets.
- D . An attacker gains unauthorized access to a network by scanning and mapping it.
Suggested Answer: C