Which of the following attacks utilizes a network packet that contains multiple network tags?
Correct Answer: B
* VLAN hopping is a type of network attack that allows an attacker to access network resources or traffic that belong to a different VLAN than the one the attacker is connected to12.
* VLAN hopping can be performed in two ways: switch spoofing or double tagging12.
* Switch spoofing is when an attacker configures their device to act as a trunk port and negotiates trunking with the switch, allowing the attacker to access all VLANs on the trunk link12.
* Double tagging is when an attacker sends a packet that contains two VLAN tags, one for the attacker's VLAN and one for the target VLAN. The first tag is stripped off by the switch, and the second tag is forwarded to the target VLAN, bypassing the VLAN isolation12.
* Double tagging is an example of an attack that utilizes a network packet that contains multiple network tags12.
* MAC flooding is a type of network attack that floods the switch's MAC address table with fake or spoofed MAC addresses, causing the switch to enter a fail-open mode and broadcast all traffic to all ports, allowing the attacker to capture or modify the traffic12. MAC flooding does not involve multiple network tags12.
* DNS spoofing is a type of network attack that alters the DNS records or responses to redirect the user to a malicious website or server, instead of the legitimate one12. DNS spoofing does not involve multiple network tags12.
* ARP poisoning is a type of network attack that sends fake or spoofed ARP messages to associate the attacker's MAC address with the IP address of another device, such as the gateway or the server, allowing the attacker to intercept or modify the traffic between the devices12. ARP poisoning does not involve multiple network tags12. References:
* 1: CompTIA Network+ N10-008 Exam Cram, 6th Edition, Chapter 7: Network Security Concepts and Tools, p. 318-319
* 2: CompTIA Network+ N10-008 Cert Guide, 1st Edition, Chapter 13: Network Attacks and Mitigation Techniques, p. 615-616