- 单项选择题 You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()
A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
G、None of the other alternatives apply
- F
关注下方微信公众号,在线模考后查看
- Which of the followi
- IPv6每个字段包含多少位?()
- Dense Wavelength Div
- 下列哪一条命令用于配置DCC的链路处于断
- 查看软件版本等相关信息,应从以下哪里选择
- Which three
- On the w
- You work a
- To configure the VLA
- 在Windows Serve
- 在交换机A上端口f0/1上配置端口安全,
- Refertotheexhibit.Bi
- What best̳
- The following&e
- Which command can yo
- Why would a network
- Assuming you build n
- What standard&
- Users at the Charlev
- 下面哪项交换机的功能能实现关闭正在接受B