nerdexam
EC-CouncilEC-Council

312-50V12 · Question #272

312-50V12 Question #272: Real Exam Question with Answer & Explanation

The correct answer is D: MAC flooding. MAC flooding is a type of attack that overwhelms an Ethernet switch's content-addressable memory (CAM) table, causing it to revert to a hub-like behavior and broadcast all unknown unicast traffic.

Submitted by thandi_sa· Mar 4, 2026Network and Perimeter Hacking

Question

Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?

Options

  • ADDoS attack
  • BEvil twin attack
  • CDNS cache flooding
  • DMAC flooding

Explanation

MAC flooding is a type of attack that overwhelms an Ethernet switch's content-addressable memory (CAM) table, causing it to revert to a hub-like behavior and broadcast all unknown unicast traffic.

Common mistakes.

  • A. A DDoS attack aims to overwhelm a target server, service, or network with a flood of traffic from multiple compromised systems, causing denial of service, rather than specifically overflowing a switch's CAM table.
  • B. An evil twin attack involves a rogue Wi-Fi access point that mimics a legitimate one to trick users into connecting and exposing their data, unrelated to Ethernet switch CAM tables.
  • C. DNS cache flooding (or poisoning) attempts to inject malicious or incorrect data into a DNS resolver's cache to redirect users to fraudulent websites, not to overflow a switch's CAM table.

Concept tested. MAC flooding attack mechanism on Ethernet switches

Reference. https://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/23674-mac-spoof.html

Topics

#MAC flooding#CAM table overflow#Ethernet switch attacks#network attacks

Community Discussion

No community discussion yet for this question.

Full 312-50V12 PracticeBrowse All 312-50V12 Questions