Which kind of Layer 2 attack targets the STP root bridge election process and allows an attacker to
control the flow of traffic?
A.
man-in-the-middle
B.
denial of service
C.
distributed denial of service
D.
CAM overflow
Which kind of Layer 2 attack targets the STP root bridge election process and allows an attacker to
control the flow of traffic?
Which kind of Layer 2 attack targets the STP root bridge election process and allows an attacker to
control the flow of traffic?
A.
man-in-the-middle
B.
denial of service
C.
distributed denial of service
D.
CAM overflow