In which type of attack does the attacker attempt to overload the CAM table on a switch so that the switch acts as a hub?

Posted by: Pdfprep Category: 210-260 Tags: , ,

In which type of attack does the attacker attempt to overload the CAM table on a switch so that the switch acts as a hub?
A . MAC spoofing
B . gratuitous ARP
C . MAC flooding
D . DoS

Answer: C

Explanation:

MAC address flooding is an attack technique used to exploit the memory and hardware limitations in a switch’s CAM table.

Source: http://hakipedia.com/index.php/CAM_Table_Overflow

Leave a Reply

Your email address will not be published.