|Exam 210-260||Question id=699||Secure Routing and Switching|
If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?
The trunk port would go into an error-disabled state.|
A VLAN hopping attack would be successful.|
A VLAN hopping attack would be prevented.|
The attacked VLAN will be pruned.|