how is the attacker able to gather information?

When an attacker is using switch spoofing to perform VLAN hopping, how is the attacker able to gather
information?

When an attacker is using switch spoofing to perform VLAN hopping, how is the attacker able to gather
information?

A.
The attacking station uses DTP to negotiate trunking with a switch port and captures all traffic that is
allowed on the trunk

B.
The attacking station tags itself with all usableVLANs to capture data that is passed through the switch,
regardless of the VLAN to which the data belongs

C.
The attacking station generates frames with two 802.1Q headers to cause the switch to forward the frames
to a VLAN that would be inaccessible to the attacker through legitimate means

D.
The attacking station uses VTP to collect VLAN information that is sent out and then tags itself with the
domain information to capture the data



Leave a Reply 0

Your email address will not be published. Required fields are marked *