D. IP Poisoning
When a network switch receives a very large quantity of random MAC addresses which would
overfill the Content Addressable Memory (CAM) table, how will the switch react?
Jhezza has just arrived at her office and she is checking her stock portfolio as she does every
day.She connects to her broker web site and decides to buy some stocks that are highly
recommended. She makes use of her special Portfolio Credit Card because she wishes to collect
travel points.This is the only online site where Jhezza uses this specific card. Jhezza always
ensures there is a secure connection established by looking at the lock icon at the bottom of her
browser window.A few weeks later, Jhezza realized that someone has compromised her credit
card number and has been doing fraudulent transactions online, the first of which is on the same
day she used it to buy stocks from her office.How did the card number get compromised?