A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()
- AAll traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewable
- BClients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patterns
- CAll traffic is redirected to the VLAN that the attacker used to flood the CAM table
- DAll traffic is flooded out all ports and an attacker is able to capture all data
- ENone of the other alternatives apply