You are a security engineer at a large multinational retailer. Your Chief Information Officer recently
attended a security conference and has asked you to secure the network infrastructure from VLAN
hopping.
Which statement describes how VLAN hopping can be avoided?
A.
There is no such thing as VLAN hopping because VLANs are completely isolated.
B.
VLAN hopping can be avoided by using IEEE 802.1X to dynamically assign the access VLAN
to all endpoints and setting the default access VLAN to an unused VLAN ID.
C.
VLAN hopping is avoided by configuring the native (untagged) VLAN on both sides of an ISL
trunk to an unused VLAN ID.
D.
VLAN hopping is avoided by configuring the native (untagged) VLAN on both sides of an IEEE
802.1Q trunk to an unused VLAN ID.
Correct !