What are two methods of mitigating MAC address flooding attacks?

What are two methods of mitigating MAC address flooding attacks? (Choose two.)

What are two methods of mitigating MAC address flooding attacks? (Choose two.)

A.
Place unused ports in a common VLAN.

B.
Implement private VLANs.

C.
Implement DHCP snooping.

D.
Implement port security.

E.
Implement VLAN access maps.

Explanation:



Leave a Reply 1

Your email address will not be published. Required fields are marked *