By changing the native VLAN, the attacker would not be able to deceive the switch by sending double tagging frame, because in that case the switch would drop the frame since its outer tag would have a VLAN ID (native VLAN ID) that is not the same as the access VLAN configured on the attacker port.
Source: https://learningnetwork.cisco.com/s/blogs/a0D3i000002SKPREA4/vlan1-and-vlan-hopping-attack
A. Configure private VLANs.
Private VLANs (PVLANs) segregate devices within the same VLAN, restricting their communication to enhance network security and isolation. To address concerns about VLAN hopping, configuring private VLANs (PVLANs) is an effective security measure. PVLANs restrict communication between devices within the same VLAN, preventing one device from "hopping" to another device's traffic within the same VLAN.
Changing the default VLAN remains a more effective measure for preventing VLAN hopping compared to configuring private VLANs because it directly mitigates the risk of unauthorized access between VLANs caused by potential vulnerabilities or misconfigurations, providing a proactive defense strategy for overall network security. Plus due to the vague question, how do we know that the VLANs aren't already private? Answer is B.
Double Tagging can only be exploited on switch ports configured to use native VLANs.[2]: 162 Trunk ports configured with a native VLAN don't apply a VLAN tag when sending these frames. This allows an attacker's fake VLAN tag to be read by the next switch.
So its B. Change the Native/Default VLAN
The question is about vlan hopping, not communication within vlans.
PVLANS segregate devices within a VLAN. This is not the threat vector the question is asking about.
Option B is correct.
A. Configure private VLANs.
Private VLANs (PVLANs) are designed to enhance security by isolating ports within the same VLAN from each other, thus preventing VLAN hopping attacks. This configuration restricts communication between devices within the same VLAN, reducing the risk of unauthorized access or interference.
D. Enable dynamic ARP inspection.
Dynamic ARP Inspection (DAI) is a security feature that helps prevent ARP spoofing attacks and VLAN hopping. VLAN hopping occurs when an attacker sends frames from one VLAN to another VLAN, exploiting the lack of proper VLAN separation.
Dynamic ARP Inspection helps mitigate VLAN hopping by inspecting ARP packets and ensuring that ARP requests and responses are valid within the associated VLANs. It builds a binding table that maps IP addresses to MAC addresses and VLANs, and it drops ARP packets that are inconsistent with this table.
While other options like configuring private VLANs (Option A), changing the default VLAN (Option B), and implementing ACLs (Option C) can contribute to network security, they may not specifically address VLAN hopping concerns. Enabling dynamic ARP inspection is a more targeted solution for preventing this specific type of attack.
D. Enable dynamic ARP inspection.
Dynamic ARP inspection (DAI) is a security feature that can help address VLAN hopping concerns. VLAN hopping occurs when an attacker sends packets with a false VLAN ID to gain unauthorized access to frames belonging to a different VLAN.
By enabling dynamic ARP inspection, the network switches can validate ARP packets to ensure that the source MAC address and IP address match. If an ARP reply is received on an interface belonging to a different VLAN than what is expected, the switch can drop or block the packet, thus preventing potential VLAN hopping attacks.
upvoted 3 times
...
This section is not available anymore. Please use the main Exam Page.N10-008 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
maggie22
Highly Voted 1 year agoHchfyvggjg
Highly Voted 1 year, 3 months agocyberbaby
10 months, 1 week agokinny4000
Most Recent 7 months, 3 weeks agof534052
10 months, 1 week agoPatrickH
10 months, 1 week ago[Removed]
1 year agochuckf
1 year agomcmillanje
1 year agokarokeksa
1 year agosalah112
1 year agoJimenybilly
1 year, 1 month agoDb_m
1 year, 1 month agoCbcyber
1 year, 2 months ago