Multiple Choice
Which of the following BEST describes a VLAN hopping attack?
A) An attacker gains unauthorized access to a network by overflowing the CAM table.
B) An attacker gains unauthorized access to a network by placing a rogue AP on the network.
C) An attacker gains unauthorized access to a network by using double-tagged packets.
D) An attacker gains unauthorized access to a network by scanning and mapping it.
Correct Answer:

Verified
Correct Answer:
Verified
Q807: A network administrator walks into a datacenter
Q808: Before upgrading the firmware on several routers,
Q809: Ann, a network technician, has just installed
Q810: An employee wishes to use a personal
Q811: A home user has purchased a new
Q813: A network technician is installing a new
Q814: To replace a defective UPS, the network
Q815: Users on a LAN segment are reporting
Q816: A NGFW is continuously sending alerts regarding
Q817: A network device compares a computed value