Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is Mac Flooding?



What is Mac Flooding?..

Answer / chaitanya

Mac Flooding is a technique where the security of given network switch is compromised. In Mac flooding the hacker or attacker floods the switch with large number of frames, then what a switch can handle. This make switch behaving as a hub and transmits all packets at all the ports. Taking the advantage of this the attacker will try to send his packet inside the network to steal the sensitive information.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Hacking Interview Questions

What are the types of computer based social engineering attacks? Explain what is Phishing?

1 Answers  


What laptops do hackers use?

0 Answers  


Explain what is Burp Suite, what are the tools it consist of?

1 Answers  


 Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

0 Answers  


What are the 3 types of hackers?

0 Answers  


What laptops hackers use?

0 Answers  


 What is footprinting in ethical hacking? What is the techniques used for footprinting?

0 Answers  


How you can avoid or prevent ARP poisoning?

1 Answers  


What tools do real hackers use?

0 Answers  


What software do hackers use?

0 Answers  


Explain what is Enumeration?

1 Answers  


 Explain what is DHCP Rogue Server?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)