Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
If an attacker attempts a MAC flood, and it is successful, what will happen to the switch?
The switch will open all ports like a hub
The attacker will gain access to the switch configuration
It will enable port security on all its ports
The switch will disconnect from the network
A MAC flood is designed to fill a switch's MAC Address Table with spoofed/incorrect address mappings. Once the table runs out of memory, the switch will fail to an "open" mode and act like a network hub. At this point, traffic will not be separated into VLANs and the attack will be able to sniff all the traffic across the switch.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.