What attack technique uses double VLAN tagging to access network devices that might not otherwise be accessible?

What attack technique uses double VLAN tagging to access network devices that might not otherwise be accessible?
A. VLAN hopping
B. DHCP spoofing
C. Rogue devices
D. MAC flooding

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.