EC-CouncilEC-Council
312-50V12 · Question #272
312-50V12 Question #272: Real Exam Question with Answer & Explanation
The correct answer is D: MAC flooding. MAC flooding is a type of attack that overwhelms an Ethernet switch's content-addressable memory (CAM) table, causing it to revert to a hub-like behavior and broadcast all unknown unicast traffic.
Submitted by thandi_sa· Mar 4, 2026Network and Perimeter Hacking
Question
Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?
Options
- ADDoS attack
- BEvil twin attack
- CDNS cache flooding
- DMAC flooding
Explanation
MAC flooding is a type of attack that overwhelms an Ethernet switch's content-addressable memory (CAM) table, causing it to revert to a hub-like behavior and broadcast all unknown unicast traffic.
Common mistakes.
- A. A DDoS attack aims to overwhelm a target server, service, or network with a flood of traffic from multiple compromised systems, causing denial of service, rather than specifically overflowing a switch's CAM table.
- B. An evil twin attack involves a rogue Wi-Fi access point that mimics a legitimate one to trick users into connecting and exposing their data, unrelated to Ethernet switch CAM tables.
- C. DNS cache flooding (or poisoning) attempts to inject malicious or incorrect data into a DNS resolver's cache to redirect users to fraudulent websites, not to overflow a switch's CAM table.
Concept tested. MAC flooding attack mechanism on Ethernet switches
Topics
#MAC flooding#CAM table overflow#Ethernet switch attacks#network attacks
Community Discussion
No community discussion yet for this question.