MAC Flooding
The size of the CAM table is fixed, and as it can store only a limited number of MAC addresses in it, an attacker may send numerous fake MAC address to the switch.
Attackers use the MAC flooding technique to force a switch to act as a hub so that they can easily sniff the traffic. (P.1119/1103)
D is Correct.
MAC address flooding attack (CAM table flooding attack) is a type of network attack where an attacker connected to a switch port floods the switch interface with very large number of Ethernet frames with different fake source MAC address.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Daniel8660
6 months, 3 weeks agoSilascarter
1 year, 5 months agojinjection
1 year, 7 months ago