Which of the following statements are true about the blackhole MAC address table?
Which of the following statements are true about the blackhole MAC address table?
A blackhole MAC address is configured on a device to discard packets whose source or destination MAC address matches the blackhole MAC address. This is a common practice used to mitigate certain network issues or security threats. Therefore, the correct statement is that after a blackhole MAC address is configured on a device, packets with the blackhole MAC address as the source or destination are discarded.
A,B,C,D are corrects.
Answer A is correct also