Certified Ethical Hacker v11 312-50v11 – Question237

Robin, a professional hacker, targeted an organization's network to sniff all the traffic. During this process,
Robin plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network.
What is the attack performed by Robin in the above scenario?

A.
ARP spoofing attack
B. STP attack
C. DNS poisoning attack
D. VLAN hopping attack

Correct Answer: B