A network administrator receives a call asking for assistance with connecting to the network. The user asks for the IP address, subnet class, and VLAN required to access the network.
This describes which of the following attacks?
A.
Social engineering
B.
Spoofing
C.
Zero-day attack
D.
VLAN hopping