Which kind of Layer 2 attack targets the STP root bridge election process and allows an attacker to control the flow of traffic?
Which technology can be deployed with a Cisco ASA 1000V to segregate Layer 2 access within a virtual cloud environment?