Which of the following attacks is used to overload the switch content addressable memory (CAM) table?

a. ARP poisoning
b. ARP spoofing
c. MAC flooding
d. Session hijacking

ANS: C

Computer Science & Information Technology

You might also like to view...

In the Word Options dialog box, Popular Commands can be found from the ________ box

A) Customize the ribbon B) New Group C) Add D) Choose commands from

Computer Science & Information Technology

If file extensions are hidden, Windows displays a ____.

A. file type B. file description C. file link D. thumbprint

Computer Science & Information Technology