188k views
3 votes
Which of the following will MOST likely allow an attacker to make a switch function like a hub?A. MAC floodingB. ARP poisoningC. DNS poisoningD. DNS spoofing

User Nat Mote
by
8.2k points

1 Answer

4 votes

Answer: Option (A) is correct

Step-by-step explanation:

CAM table flooding attack also known as the MAC address flooding attack is referred to as a kind of network attack where an individual or an attacker plugged to a switch port will flood the interface switch with several Ethernet frames that consist of fake MAC address. Also under computer networking, the MAC flooding is referred to as a technique implemented in order to imperil the security of switches.

User Piterbarg
by
8.8k points