问题:
A . All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewable
B . Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patterns
C . All traffic is redirected to the VLAN that the attacker used to flood the CAM table
D . All traffic is flooded out all ports and an attacker is able to capture all data
E . None of the other alternatives apply
● 参考解析
本题暂无解析