Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is Mac Flooding?



What is Mac Flooding?..

Answer / chaitanya

Mac Flooding is a technique where the security of given network switch is compromised. In Mac flooding the hacker or attacker floods the switch with large number of frames, then what a switch can handle. This make switch behaving as a hub and transmits all packets at all the ports. Taking the advantage of this the attacker will try to send his packet inside the network to steal the sensitive information.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Hacking Interview Questions

How do hackers hack passwords?

0 Answers  


Explain what is CSRF (Cross Site Request Forgery)? How you can prevent this?

1 Answers  


What is Mac Flooding?

1 Answers  


Who is the best hacker in the world?

0 Answers  


Who is the most dangerous hacker?

0 Answers  


 Mention what are the types of password cracking techniques?

1 Answers  


Explain how you can stop your website getting hacked?

2 Answers  


 Explain what is MIB?

1 Answers  


Explain what is Brute Force Hack?

1 Answers  


Explain what are the types of hacking stages?

2 Answers  


 Explain what is Ethical Hacking?

1 Answers  


What laptops do hackers use?

0 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)