In which type of attack does the attacker attempt to overload the CAM table on a switch so that the switch acts
as a hub?
A.
MAC spoofing
B.
gratuitous ARP
C.
MAC flooding
D.
DoS
Explanation:
BD
MAC address flooding is an attack technique used to exploit the memory and hardware limitations in a switch’s
CAM table.
Source: http://hakipedia.com/index.php/CAM_Table_Overflow