What describes the attacker connecting a rogue switch into the network by tricking a legitimate switch and creating a trunk link between them?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

What describes the attacker connecting a rogue switch into the network by tricking a legitimate switch and creating a trunk link between them?

Explanation:
Switch spoofing describes the attacker’s goal: a rogue device is placed on the network and made to appear as a legitimate switch to the upstream switch. When DTP (Dynamic Trunking Protocol) or similar trunking negotiations are enabled, the legitimate switch can be coaxed into forming a trunk with the rogue device. That trunk link carries traffic for multiple VLANs, allowing the attacker to monitor, capture, or manipulate traffic across those VLANs. This is the scenario described by “connecting a rogue switch into the network by tricking a legitimate switch and creating a trunk link between them.” VLAN hopping is related but describes the act of moving between VLANs once a trunk exists, often by exploiting trunk misconfigurations or tagging tricks. MAC duplicating and the term TMAC aren’t typically used to describe this attacker technique.

Switch spoofing describes the attacker’s goal: a rogue device is placed on the network and made to appear as a legitimate switch to the upstream switch. When DTP (Dynamic Trunking Protocol) or similar trunking negotiations are enabled, the legitimate switch can be coaxed into forming a trunk with the rogue device. That trunk link carries traffic for multiple VLANs, allowing the attacker to monitor, capture, or manipulate traffic across those VLANs. This is the scenario described by “connecting a rogue switch into the network by tricking a legitimate switch and creating a trunk link between them.”

VLAN hopping is related but describes the act of moving between VLANs once a trunk exists, often by exploiting trunk misconfigurations or tagging tricks. MAC duplicating and the term TMAC aren’t typically used to describe this attacker technique.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy