An attacker has inserted a hub into a trunk link on the local network in an attempt to access the management subnet to attack the networking devices.
Which of the following attacks can be used on a trunk link to provide access to the management subnet?
A . Brute force
B . VLAN hopping
C . Evil twin
D . DNS poisoning
Answer: B