Question:
Why would an administrator use a network security auditing tool to flood the switch MAC address table with fictitious MAC addresses?
- to determine which ports are not correctly configured to prevent MAC address flooding
- to determine when the CAM table size needs to be increased in order to prevent overflows
- to determine if the switch is forwarding the broadcast traffic correctly
- to determine which ports are functioning
Exam with this question: CCNA 2 (v5.0.3 + v6.0) Final Exam Answers
Please login or Register to submit your answer