Which option best describes a MAC address spoofing attack?
- An attacker gains access to another host and masquerades as the rightful user of that device.
- An attacker alters the MAC address of his host to match another known MAC address of a target host.
- An attacker alters the MAC address of the switch to gain access to the network device from a rogue host device.
- An attacker floods the MAC address table of a switch so that the switch can no longer filter network access based on MAC addresses.
Exam with this question: CCNA Security Chapter 6 Exam (CCNAS v1.2)
Please login or Register to submit your answer