Which action best describe a MAC address spoofing attack?

IT Questions BankCategory: CCNA Security v1.2Which action best describe a MAC address spoofing attack?

Which action best describe a MAC address spoofing attack?

  • altering the MAC address of an attacking host to match that of a legitimate host.
  • bombarding a switch with fake source MAC addresses.
  • forcing the election of a rogue root bridge
  • flooding the LAN with excessive traffic

Exam with this question: CCNA Security Final Exam (CCNAS v1.2)

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments