An attacker has started a program that fills the MAC address table of the local switch with false information. What will happen to an inbound frame when the switch MAC address table is full and does not contain information about the destination MAC address?

IT Questions BankCategory: CCNPAn attacker has started a program that fills the MAC address table of the local switch with false information. What will happen to an inbound frame when the switch MAC address table is full and does not contain information about the destination MAC address?

An attacker has started a program that fills the MAC address table of the local switch with false information. What will happen to an inbound frame when the switch MAC address table is full and does not contain information about the destination MAC address?

  • The inbound frame will be dropped.
  • The frame will be flooded out all ports except the one on which it is received.
  • The source MAC address will be added to the MAC address table, displacing the oldest entry.
  • The MAC address table will be immediately flushed and the source MAC address entered in the table.
  • The inbound frame will be buffered until an entry in the MAC address table times out and is replaced with the source MAC address of the frame.

Exam with this question: CCNP TSHOOT Chapter 4 Exam Answers (Version 7)

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x