Which action best describes a MAC address spoofing attack?
- flooding the LAN with excessive traffic
- bombarding a switch with fake source MAC addresses
- altering the MAC address of an attacking host to match that of a legitimate host
- forcing the election of a rogue root bridge
Explanation: The attacker commonly runs a program or script that sends a stream of frames to the switch so the switch keeps the incorrect (spoofed) information in the MAC address table.
Exam with this question: CyberOps Associate (Version 1.0) - Module 17: Attacking What We Do Quiz Answers
Exam with this question: 3.4.2 Attacking the Foundation Quiz
Exam with this question: 4.4.2 Attacking What We Do Quiz
Please login or Register to submit your answer