EC-CouncilEC-Council
312-50V13 · Question #464
312-50V13 Question #464: Real Exam Question with Answer & Explanation
The correct answer is C: MAC flooding. A MAC flooding attack aims to overflow an Ethernet switch's Content-Addressable Memory (CAM) table, forcing it to act as a hub.
Submitted by daniela_cl· Mar 6, 2026Sniffing
Question
Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?
Options
- AEvil twin attack
- BDNS cache flooding
- CMAC flooding
- DDDoS attack
Explanation
A MAC flooding attack aims to overflow an Ethernet switch's Content-Addressable Memory (CAM) table, forcing it to act as a hub.
Common mistakes.
- A. An evil twin attack involves a rogue wireless access point mimicking a legitimate one to intercept client connections, not targeting a switch's CAM table.
- B. DNS cache flooding (or poisoning) injects fraudulent data into a DNS resolver's cache to redirect traffic, unrelated to switch CAM tables.
- D. A DDoS attack involves overwhelming a target with traffic from multiple sources, which is a different mechanism and objective than overflowing a switch's internal tables.
Concept tested. MAC flooding attack on switches
Topics
#MAC flooding#CAM table overflow#switch security#network attacks
Community Discussion
No community discussion yet for this question.