Which action best describe a MAC address spoofing attack?
- altering the MAC address of an attacking host to match that of a legitimate host.
- bombarding a switch with fake source MAC addresses.
- forcing the election of a rogue root bridge
- flooding the LAN with excessive traffic
Exam with this question: CCNA Security Final Exam (CCNAS v1.2)
Please login or Register to submit your answer