Which type of attack can be mitigated by configuring the default native VLAN to be unused?
The correct answer is C. VLAN hopping.
VLAN hopping is an attack in which an attacker exploits a vulnerability in a switch to gain access to traffic on a VLAN other than the one to which the attacker is supposed to have access. This type of attack is also known as VLAN jumping.
One way to mitigate VLAN hopping is to configure the default native VLAN to be unused. The native VLAN is the VLAN that is assigned to untagged traffic on a trunk port. By default, Cisco switches use VLAN 1 as the native VLAN. If VLAN 1 is not used for any other purpose, an attacker can use VLAN hopping to gain access to traffic on VLAN 1.
To prevent this type of attack, you can configure the default native VLAN to be unused. This means that any untagged traffic will be dropped by the switch, preventing an attacker from gaining access to traffic on another VLAN.
It is important to note that configuring the default native VLAN to be unused is just one way to mitigate VLAN hopping. Other methods include using VLAN access control lists (VACLs) to filter traffic between VLANs, configuring port security to limit the number of MAC addresses allowed on a port, and disabling unused ports on a switch.
CAM table overflow is a type of attack in which an attacker floods a switch with fake MAC addresses in order to overload the switch's CAM table. Switch spoofing is an attack in which an attacker impersonates a switch in order to intercept network traffic. MAC spoofing