Implementing Cisco IP Switched Networks (SWITCH v2-0) (#433)

What attack technique uses double VLAN tagging to access network devices that might not otherwise be accessible?

VLAN hopping
DHCP spoofing
Rogue devices
MAC flooding