Question:
An administrator wants to use a network security auditing tool on a switch to verify which ports are not protected against a MAC flooding attack. For the audit to be successful, what important factor must the administrator consider?
- if the CAM table is empty before the audit is started
- if all the switch ports are operational at the same speed
- if the number of valid MAC addresses and spoofed MAC addresses is the same
- the aging-out period of the MAC address table
Exam with this question: CCNA 2 (v5.0.3 + v6.0) Chapter 2 Exam Answers
Please login or Register to submit your answer