You work as a network technician at Company. Your boss, Mrs.   , is interested in   switch spoofing.  She asks you how an attacker would collect information with VLAN hoping  through switch spoofing. You should tell her that the attacking station... ()

A . ...uses VTP to collect VLAN information that is sent out and then tags itself with the domain  information in order to capture the data. B . ...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a  VLAN that would be inaccessible to the attacker through legitimate means. C . ...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the  trunk. D . ...tags itself with all usable VLANs to capture data that is passed through the switch, regardless  of the VLAN to which the data belongs. E . None of the other alternatives apply

时间:2022-11-07 01:21:36 所属题库:CCNP(642-813)题库

相似题目

推荐题目