An administrator wants to use a network security auditing tool on a switch to verify which ports are not protected against a MAC flooding attack. For the audit to be successful, what important factor must the administrator consider?

IT Questions BankCategory: CCNAAn administrator wants to use a network security auditing tool on a switch to verify which ports are not protected against a MAC flooding attack. For the audit to be successful, what important factor must the administrator consider?

Question:
An administrator wants to use a network security auditing tool on a switch to verify which ports are not protected against a MAC flooding attack. For the audit to be successful, what important factor must the administrator consider?

  • if the CAM table is empty before the audit is started
  • if all the switch ports are operational at the same speed
  • if the number of valid MAC addresses and spoofed MAC addresses is the same
  • the aging-out period of the MAC address table

Exam with this question: CCNA 2 (v5.0.3 + v6.0) Chapter 2 Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x