After a security incident, a technician reveals that company data was stolen. During the investigation, it is discovered that a host disguised itself as a switch. Which of the following best describes the attack that occurred?
VLAN hopping occurs when an attacker tricks a switch into believing the host is another switch by generating tagged frames or exploiting trunk negotiation (DTP). This allows the attacker to access traffic from multiple VLANs, potentially stealing sensitive data.
B. Evil twin is a rogue wireless AP attack, unrelated to switch impersonation.
C. DNS poisoning corrupts name resolution, not VLAN access.
D. ARP spoofing is a Layer 2 on-path attack, not masquerading as a switch.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit