When an attacker is using switch spoofing to perform VLAN hopping, how is the attacker able to gather information?
Select the best response.
A.
The attacking station uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the trunk
B.
The attacking station tags itself with all usable VLANs to capture data that is passed through the switch, regardless of the VLAN to which the data belongs.
C.
The attacking station will generate frames with two 802.1Q headers to cause the switch to
forward the frames to a VLAN that would be inaccessible to the attacker through legitimate means.
D.
The attacking station uses VTP to collect VLAN information that is sent out and then tags itself with the domain information in order to capture the data.