1. What is the behavior of a switch as a result of a successful MAC address table attack?
- The switch will shut down.
- The switch interfaces will transition to the error-disabled state.
- The switch will forward all received frames to all other ports within the VLAN.
- The switch will drop all received frames.
2. What would be the primary reason a threat actor would launch a MAC address overflow attack?
- So that the threat actor can see frames that are destined for other devices.
- So that the threat actor can execute arbitrary code on the switch.
- So that the switch stops forwarding traffic.
- So that legitimate hosts cannot obtain a MAC address.
3. What mitigation technique must be implemented to prevent MAC address overflow attacks?
- Port security
- DHCP snooping