In which type of attack does the attacker attempt to overload the CAM table on a switch so that the switch acts as a hub?
A.
MAC spoofing
B.
gratuitous ARP
C.
MAC flooding
D.
DoS
In which type of attack does the attacker attempt to overload the CAM table on a switch so that the switch acts as a hub?
In which type of attack does the attacker attempt to overload the CAM table on a switch so that the switch acts as a hub?
A.
MAC spoofing
B.
gratuitous ARP
C.
MAC flooding
D.
DoS