Which type of attack can be mitigated by configuring the default native VLAN to be unused?
A. CAM table overflow
B. switch spoofing
C. VLAN hopping
D. MAC spoofing
Which type of attack can be mitigated by configuring the default native VLAN to be unused?
A. CAM table overflow
B. switch spoofing
C. VLAN hopping
D. MAC spoofing