Which description correctly describes a MAC addressflooding attack?

Which description correctly describes a MAC addressflooding attack?

Which description correctly describes a MAC addressflooding attack?

A.
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device
then becomes the destination address found in the Layer 2 frames sent by the valid network device

B.
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device
the becomes the source address found in the Layer2 frames sent by the valid network device

C.
The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The
switch the forwards frames destined for the valid host to the attacking device

D.
The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch
the forward frames destined for the valid host to the attacking device.

E.
Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The
result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is
subsequently flooded out all ports.

F.
Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The
result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is
subsequently flooded out all ports.



Leave a Reply 0

Your email address will not be published. Required fields are marked *