What are two methods of mitigating MAC address flooding attacks? (Choose two.)
A.
Place unused ports in a common VLAN.
B.
Implement private VLANs.
C.
Implement DHCP snooping.
D.
Implement port security.
E.
Implement VLAN access maps.
Explanation:
I can’t see use in access-maps, compare to
http://www.aiotestking.com/cisco/what-are-two-methods-of-mitigating-mac-address-flooding-attacks-2/