An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity?
A.
The switch could offer fake DHCP addresses.
B.
The switch could become the root bridge.
C.
The switch could be allowed to join the VTP domain.
D.
The switch could become a transparent bridge.