This is a dedicated watch page for a single video.
In which type of attack, does an attacker create a fake root bridge and redirect network traffic, allowing the attacker to gain unauthorized access to sensitive information or disrupt network operations?