04-26-2009, 12:48 PM
refer to question QID:BCM398 When an attacker is using switch spoofing to perform VLAN hopping, how is the attacker able to gather information?
Your answer an your explanation describes Switch Spoofing instead of VLAN Hopping
Please correct it.
CCNP Self-Study CCNP BCMSN Official Exam Certification Guide
(Fourth Edition ), David Hucaby
Chapter 16: Securing with VLANs, page 420 and 422
Any other comments?
uno4
Your answer an your explanation describes Switch Spoofing instead of VLAN Hopping
Please correct it.
CCNP Self-Study CCNP BCMSN Official Exam Certification Guide
(Fourth Edition ), David Hucaby
Chapter 16: Securing with VLANs, page 420 and 422
Any other comments?
uno4