Problem: An exploit assessment determines whether weaknesses can be exploited. Some common exploits include social engineering, MAC Flood Attack, and TCP SYN Flood Attack. Select one of these common attacks and answer the following:
1. What is the vulnerability that allows the attack to be successful?
2. How can the attack be prevented?
3. What is a real-life example of the attack?