If you change the native VLAN on the port to an unused VLAN, what happens if an attacker
attempts a double tagging attack?
A.
The trunk port would go into an error-disable state.
B.
A VLAN hopping attack would be successful
C.
A VLAN hopping attack would be prevented
D.
the attacked VLAN will be pruned