Which action best describes a MAC address spoofing attack?

IT Questions BankCategory: CCNA CyberOpsWhich action best describes a MAC address spoofing attack?

Which action best describes a MAC address spoofing attack?

  • flooding the LAN with excessive traffic
  • bombarding a switch with fake source MAC addresses
  • altering the MAC address of an attacking host to match that of a legitimate host
  • forcing the election of a rogue root bridge

Explanation: The attacker commonly runs a program or script that sends a stream of frames to the switch so the switch keeps the incorrect (spoofed) information in the MAC address table.

Exam with this question: CyberOps Associate (Version 1.0) - Module 17: Attacking What We Do Quiz Answers
Exam with this question: 3.4.2 Attacking the Foundation Quiz
Exam with this question: 4.4.2 Attacking What We Do Quiz

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments