单项选择题
A. The traffic will be forwarded to the router processor for further processing.
B. The traffic will be dropped.
C. The traffic will be forwarded to the TCAM for further processing.
D. The traffic will be forwarded without further processing.
多项选择题 A hacker on the Company network is attempting to hop onto a different VLAN. Which two statements about VLAN hopping are true? ()
多项选择题 The Company security administrator wants to prevent VLAN hopping on the network. What is one method that can be used to do this? ()
多项选择题 The Company security administrator is concerned with VLAN hopping based attacks. Which two statements about these attacks are true? ()