An administrator wants to use a network security auditing tool on a switch to verify which ports are not protected against a MAC flooding attack. For the audit to be successful, what important factor must the administrator consider?
if the number of valid MAC addresses and spoofed MAC addresses is the same
if the CAM table is empty before the audit is started
if all the switch ports are operational at the same speed
the aging-out period of the MAC address table