PdfPrep.com

Which of the following attacks can be used on a trunk link to provide access to the management subnet?

An attacker has inserted a hub into a trunk link on the local network in an attempt to access the management subnet to attack the networking devices.

Which of the following attacks can be used on a trunk link to provide access to the management subnet?
A . Brute force
B . VLAN hopping
C . Evil twin
D . DNS poisoning

Answer: B

Exit mobile version