what happens if an attacker attempts a double tagging a…

If you change the native VLAN on the port to an unused VLAN, what happens if an attacker
attempts a double tagging attack?

If you change the native VLAN on the port to an unused VLAN, what happens if an attacker
attempts a double tagging attack?

A.
The trunk port would go into an error-disable state.

B.
A VLAN hopping attack would be successful

C.
A VLAN hopping attack would be prevented

D.
the attacked VLAN will be pruned



Leave a Reply 0

Your email address will not be published. Required fields are marked *