1/8
These flashcards cover the key concepts related to MAC flooding and how switches operate with MAC address tables.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
MAC Flooding
A technique used by attackers to overwhelm a switch's MAC address table with excessive fake MAC addresses.
MAC Address Table
A table maintained by switches to track the association between MAC addresses of workstations and their corresponding ports.
Fail Open Mode
A condition in which a switch cannot store more MAC addresses, causing it to behave like a network hub, sending incoming packets to all ports.
Content Address Memory (CAM) Table
Another term for the MAC address table, used by switches to quickly locate the devices connected to each port.
Switch Operation
The process by which a switch forwards information based on the destination MAC address found in data frames.
Port Behavior in Switches
The way switches forward packets only to the intended recipient's port, preventing other workstations from seeing the data.
Data Frame
A unit of data sent over the network, containing source and destination MAC addresses.
Attacker's Goal in MAC Flooding
To intercept and view all data passing through the switch, which is normally restricted to intended recipients.
Workstations A, B, C, and D
Examples of devices in the network that communicate through the switch.