An attacker has inserted a hub into a trunk link on the local network in an attempt to access the management subnet to attack the networking devices. Which of the following attacks can be used on a trunk link to provide access to the management subnet?
A) Brute force
B) VLAN hopping
C) Evil twin
D) DNS poisoning
Correct Answer:
Verified
Q618: The corporate head office has assigned the
Q619: To achieve a more efficient and secure
Q620: A small company is requesting a quote
Q621: A network technician notices that switches of
Q622: A company's web-based application has a database
Q624: A network technician is performing an initial
Q625: Which of the following additional capabilities does
Q626: Management at a company wants to increase
Q627: A user in the marketing department reports
Q628: A technician needs to connect two routers
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents