1/250 верно
Single choice

Which attack fills a switch MAC address table with fake source MAC addresses?