Which type of an attack is considered MAC poisoning?
A . Duplicating the MAC address of a legitimate device so frames are forwarded to the incorrect port
B . Host imitating a trunk port by using tagging and trunking protocols
C . Flooding MAC addresses to the switch to fill its CAM table, causing the switch to act as a hub
D . Host on a VLAN gaining unauthorized access to other VLANs on the network
Answer: A
Latest D-PCM-DY-23 Dumps Valid Version with 170 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund