Which of the following attacks can be used on a trunk link to provide access to the management subnet?

Posted by: Pdfprep Category: N10-007 Tags: , ,

An attacker has inserted a hub into a trunk link on the local network in an attempt to access the management subnet to attack the networking devices.

Which of the following attacks can be used on a trunk link to provide access to the management subnet?
A . Brute force
B . VLAN hopping
C . Evil twin
D . DNS poisoning

Answer: B

Leave a Reply

Your email address will not be published.