This module discussed vulnerabilities and attacks that are specific to Layer
2 of the OSI model. Several types of Layer 2 attacks were introduced along with
steps that can be taken to mitigate them. Students should now be able to
discuss the types of Layer 2 network attacks that can be mitigated using Cisco
IOS commands. Students should be able to describe how CAM table overflow is
used in a network attack, as well as how to prevent CAM table overflow.
Students should understand MAC spoofing attacks and how to prevent them.
Students should also be able to explain how DHCP can be used in a network
attack.