If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?
If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?
A . The trunk port would go into an error-disabled state.
B . A VLAN hopping attack would be successful.
C . A VLAN hopping attack would be prevented.
D . The attacked VLAN will be pruned.
Answer: C
Latest 210-260 Dumps Valid Version with 498 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments