Why would an administrator use a network security auditing tool to flood the switch MAC address table with fictitious MAC addresses?

IT Questions BankWhy would an administrator use a network security auditing tool to flood the switch MAC address table with fictitious MAC addresses?

Question:
Why would an administrator use a network security auditing tool to flood the switch MAC address table with fictitious MAC addresses?

  • to determine which ports are not correctly configured to prevent MAC address flooding
  • to determine when the CAM table size needs to be increased in order to prevent overflows
  • to determine if the switch is forwarding the broadcast traffic correctly
  • to determine which ports are functioning

Exam with this question: CCNA 2 (v5.0.3 + v6.0) Final Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x