Which type of an attack is considered MAC poisoning?

Which type of an attack is considered MAC poisoning?
A . Duplicating the MAC address of a legitimate device so frames are forwarded to the incorrect port
B . Host imitating a trunk port by using tagging and trunking protocols
C . Flooding MAC addresses to the switch to fill its CAM table, causing the switch to act as a hub
D . Host on a VLAN gaining unauthorized access to other VLANs on the network

Answer: A

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments