VLAN hopping allows an attacker to send traffic into another VLAN without authorization, often by impersonating a switch and negotiating a trunk link. This lets the attacker traverse into normally inaccessible VLANs.
A. MAC flooding disrupts switch operations but does not cross VLANs.
B. DNS poisoning corrupts name resolution.
D. ARP spoofing reroutes local traffic but doesn’t grant VLAN traversal.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit