Explain Why is VLAN trunking a security risk?
Submitted by: Administratorwhile physical separation between network segments,VLAN
rely on switching should be perfect, if not
so,misconfiguration or a bug could cause the VLAN barriers
to be broken
There i a 2 risk
1.packet leaks from one VLAN to another, possibly revealing
sensitive information
2.In the second, a specially crafted packet is injected
into another VLAN. Any attack that could cause the VLAN
barriers to break requires a machine directly attached to
the physical network. This means that only a local machine
can execute an attack against the switch.
Submitted by: Administrator
rely on switching should be perfect, if not
so,misconfiguration or a bug could cause the VLAN barriers
to be broken
There i a 2 risk
1.packet leaks from one VLAN to another, possibly revealing
sensitive information
2.In the second, a specially crafted packet is injected
into another VLAN. Any attack that could cause the VLAN
barriers to break requires a machine directly attached to
the physical network. This means that only a local machine
can execute an attack against the switch.
Submitted by: Administrator
Read Online Telecom Security Job Interview Questions And Answers
Top Telecom Security Questions
☺ | Explain Why is VLAN trunking a security risk? |
☺ | Tell me how to do testing in webnms(network management system)? |
☺ | Explain how can cdma work? |
☺ | Do you know what is cdma technology? |
☺ | Do you know history of cdma? |
Top Telecom Engineering Categories
☺ | Telecom Interview Questions. |
☺ | GSM Interview Questions. |
☺ | Telecom General Interview Questions. |
☺ | CDMA Interview Questions. |
☺ | Telecom Protocols Interview Questions. |