A cybersecurity analyst is using the macof tool to evaluate configurations of switches deployed in the backbone network of an organization. Which type of LAN attack is the analyst targeting during this evaluation?
- VLAN double-tagging
- MAC address table overflow
- VLAN hopping
- DHCP spoofing