You work as a network technician at Company. Your boss, Mrs. , is interested in switch spoofing. She asks you how an attacker would collect information with VLAN hoping through switch spoofing. You should tell her that the attacking station... ()
- A...uses VTP to collect VLAN information that is sent out and then tags itself with the domain information in order to capture the data.
- B...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a VLAN that would be inaccessible to the attacker through legitimate means.
- C...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the trunk.
- D...tags itself with all usable VLANs to capture data that is passed through the switch, regardless of the VLAN to which the data belongs.
- ENone of the other alternatives apply