Why would an administrator use a network security auditing tool to flood the switch MAC address table with fictitious MAC addresses?

Questions BankCategory: CCNAWhy would an administrator use a network security auditing tool to flood the switch MAC address table with fictitious MAC addresses?
ITExamAnswers Staff asked 1 month ago
Question:
Why would an administrator use a network security auditing tool to flood the switch MAC address table with fictitious MAC addresses?

  • to determine which ports are not correctly configured to prevent MAC address flooding
  • to determine when the CAM table size needs to be increased in order to prevent overflows
  • to determine if the switch is forwarding the broadcast traffic correctly
  • to determine which ports are functioning

More Questions: CCNA 2 (v5.0.3 + v6.0) Final Exam Answers


Related Articles