ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 38 - N10-009 discussion

Report
Export

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

A.
ARP spoofing
Answers
A.
ARP spoofing
B.
Evil twin
Answers
B.
Evil twin
C.
MAC flooding
Answers
C.
MAC flooding
D.
DNS poisoning
Answers
D.
DNS poisoning
Suggested answer: C

Explanation:

Definition of MAC Flooding:

MAC flooding is an attack where a malicious actor sends numerous fake MAC addresses to a switch, overwhelming its CAM table. The CAM table stores MAC addresses and their associated ports for efficient traffic forwarding.

Impact of MAC Flooding:

CAM Table Overflow: When the CAM table is full, the switch cannot learn new MAC addresses and is forced to broadcast traffic to all ports, leading to a degraded network performance and potential data interception.

Switch Behavior: The switch operates in a fail-open mode, treating the network as a hub, which can be exploited for eavesdropping on traffic.

Comparison with Other Attacks:

ARP Spoofing: Involves sending false ARP (Address Resolution Protocol) messages to associate the attacker's MAC address with the IP address of another device.

Evil Twin: Involves creating a rogue wireless access point that mimics a legitimate one to intercept data.

DNS Poisoning: Involves corrupting the DNS cache with false information to redirect traffic to malicious sites.

Preventive Measures:

Port Security: Configure port security on switches to limit the number of MAC addresses per port, preventing CAM table overflow.

Network Segmentation: Use VLANs to segment network traffic and limit the impact of such attacks.

CompTIA Network+ study materials on network security threats and mitigation techniques.

asked 02/10/2024
Tsige Tessema
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first