How does MAC address flooding cause a vulnerability in the network?
- The CAM table will be full, causing legitimate frames to be forwarded out all ports within the VLAN and allowing unauthorized users to capture data.*
- An attacking device can send or receive packets on various VLANs and bypass Layer 3 security measures.
- An attacking device can exhaust the address space available to the DHCP servers for a period of time or establish itself as a DHCP server in maninthemiddle attacks.
- Information that is sent through CDP is transmitted in clear text and is unauthenticated, allowing it to be captured and to divulge network topology information.
More Questions: CCNP SWITCH Chapter 10 Exam Answers