Implementing Cisco IP Switched Networks (SWITCH v2-0) (#244)

What attack technique can be used to force user traffic through an attacking device, causing a man-in-the-middle attack?

VLAN hopping
DHCP spoofing
Rogue device
MAC flooding