Which of the following attacks is used to overload the switch content addressable memory (CAM) table?

a. ARP poisoning
b. ARP spoofing
c. MAC flooding
d. Session hijacking


ANS: C

Computer Science & Information Technology

You might also like to view...

Class C fire extinguishers are best suited for which of the following fires?

A) Computer equipment fires B) Fires in document storage areas C) Fires with liquids and gases D) Fires involving metals

Computer Science & Information Technology

Which of the following is not a type of server?

(a) Web server. (b) word processing server. (c) database server. (d) e-mail server.

Computer Science & Information Technology

Leader tabs can be set on the ruler.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The standard measurement for monitors is referred to as _______________ and is 72 pixels per inch.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology