As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?
The correct answer is:
C. MAC flooding.
MAC flooding is an attack where a threat actor overwhelms a switch's content-addressable memory (CAM) table by sending numerous fake MAC addresses. This causes the switch to fail and behave like a hub, broadcasting traffic to all ports, which allows the attacker to potentially capture sensitive data through network traffic interception.
The correct answer is C. MAC flooding
MAC flooding is a type of network attack that specifically targets a switch's Content-Addressable Memory (CAM) table by overwhelming it with fake MAC addresses.
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ba10f26
3 weeks, 3 days agochupapi_001
2 months, 2 weeks ago