web analytics

What happens if an attacker attempts a double-tagging attack?

 Free Free Download The Exam Relevant Study Guide

Send Via Email (Need Reachable Email ID)

If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?
A. The trunk port would go into an error-disabled state.
B. A VLAN hopping attack would be successful.
C. A VLAN hopping attack would be prevented.
D. The attacked VLAN will be pruned.
Correct Answer: C

 Free Free Download The Exam Relevant Study Guide

Send Via Email (Need Reachable Email ID)