Implementing Cisco IP Switched Networks (SWITCH v2-0) (#149)

What attack technique attempts to fill a switching table so the attackers can capture traffic passing through a switch?

VLAN hopping
MAC spoofing
Rogue device
MAC flooding