When a hacker attempts to perform a VLAN hopping attack, what are the two approaches likely to be used?
What will be an ideal response?
ANSWER: The two approaches the hacker might use for VLAN hopping are as follows:
* double tagging-The hacker stacks VLAN tags in Ethernet frames. When the first, legitimate tag is removed by a switch, the second, illegitimate tag is revealed, tricking a switch into forwarding the transmission on to a restricted VLAN.
* switch spoofing-An attacker connects to a switch and then makes the connection look to the switch as if it's a trunk line. The switch might autoconfigure its port into trunk mode when it detects trunk mode on the other end of the connection. A hacker can then feed his own VLAN traffic into that port and access VLANs throughout the network.
You might also like to view...
An algorithm is
a. The inputs and outputs of a program b. The part of the computer that does the processing c. A finite set of steps to solve a problem d. A complete computer program
Most slide layouts do not include any placeholders.
Answer the following statement true (T) or false (F)
The name of the Web page appears on the status bar at the top of the window.
Answer the following statement true (T) or false (F)
A(n) ____________________ has predefined fonts, font sizes, font colors, and background graphics.
Fill in the blank(s) with the appropriate word(s).