Robin, a professional hacker, targeted an organization's network to sniff all the traffic. During this process, Robin plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network.
What is the attack performed by Robin in the above scenario?
blacksheep6r
Highly Voted 2 years, 1 month agoking777
1 year, 2 months agoSamAJames
Most Recent 8 months, 3 weeks agoDaniel8660
1 year agoANDRESCB1988
2 years, 3 months ago