An administrator wants to use a network security auditing tool on a switch to verify which ports are not protected against a MAC flooding attack. For the audit to be successful, what important factor must the administrator consider?
 
if the number of valid MAC addresses and spoofed MAC addresses is the same
 
if the CAM table is empty before the audit is started
 
if all the switch ports are operational at the same speed
 
the aging-out period of the MAC address table