Questions With Solutions 100% Solved
Which of the following is a method of VLAN hopping? Double tagging
Drag each description on the left to the appropriate switch attack type on the right. ARP
spoofing/poisoning
The source device sends frames to the attacker's MAC address instead of to the correct device.
Dynamic Trunking Protocol
Should be disabled on the switch's end user (access) ports before implementing the switch
configuration in to the network.
MAC flooding
Causes packets to fill up the forwarding table and consumes so much of the switch's memory that
it enters a state called fail open mode.
MAC spoofing
Can be used to hide the identity of the attacker's computer or impersonate another device on the
network.