1.

________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.(a) Switches(b) Routers(c) Hubs(d) RepeatersThe question was asked in class test.This interesting question is from Network Models in section Understanding Network Models for Security of Cyber Security

Answer»

The CORRECT option is (a) Switches

The explanation is: Switches MAY be forced for flooding traffic to all VLAN PORTS ALLOWING interception of data through any DEVICE that are connected to a VLAN. It is a vulnerability of data link layer.



Discussion

No Comment Found

Related InterviewSolutions