VLAN hopping occurs when an attacker tricks a switch into believing the host is another switch by generating tagged frames or exploiting trunk negotiation (DTP). This allows the attacker to access traffic from multiple VLANs, potentially stealing sensitive data.
B. Evil twin is a rogue wireless AP attack, unrelated to switch impersonation.
C. DNS poisoning corrupts name resolution, not VLAN access.
D. ARP spoofing is a Layer 2 on-path attack, not masquerading as a switch.
References (CompTIA Network+ N10-009):
Domain: Network Security — VLAN hopping attacks, switch spoofing techniques.