Which of the following attacks is used to overload the switch content addressable memory (CAM) table?
a. ARP poisoning
b. ARP spoofing
c. MAC flooding
d. Session hijacking
ANS: C
Computer Science & Information Technology
You might also like to view...
In the Word Options dialog box, Popular Commands can be found from the ________ box
A) Customize the ribbon B) New Group C) Add D) Choose commands from
Computer Science & Information Technology
If file extensions are hidden, Windows displays a ____.
A. file type B. file description C. file link D. thumbprint
Computer Science & Information Technology