Implementing Cisco Network Security (IINS v3.0) (#35)

What are the primary attack methods of VLAN hopping? (Choose two.)

VoIP hopping
Switch spoofing
CAM-table overflow
Double tagging