Which two statements about VLAN hopping are true?

Which two statements about VLAN hopping are true? (Choose two)

Which two statements about VLAN hopping are true? (Choose two)

A.
Attacks are prevented by utilizing the port-security feature.

B.
An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.

C.
Configuring an interface with the "switchport mode dynamic" command will prevent VLAN hopping.

D.
An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q encapsulation.

E.
Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.

Explanation:

When securing VLAN trunks, also consider the potential for an exploit called VLAN hopping. Here, an attacker positioned on one access VLAN can craft and send frames with spoofed 802.1Q tags so that the packet payloads ultimately appear on a totally different VLAN, all without the use of a router.

For this exploit to work, the following conditions must exist in the network configuration:
? The attacker is connected to an access switch port.
? The same switch must have an 802.1Q trunk.
? The trunk must have the attacker’s access VLAN as its native VLAN. To prevent from VLAN hopping turn off Dynamic Trunking Protocol on all unused ports and specify the port be in access mode to limit the user to a single VLAN.



Leave a Reply 0

Your email address will not be published. Required fields are marked *