What are two methods of mitigating MAC address flooding attacks? (Choose two.)
A.
Place unused ports in a common VLAN.
B.
Implement private VLANs.
C.
Implement DHCP snooping.
D.
Implement port security.
E.
Implement VLAN access maps.
What are two methods of mitigating MAC address flooding attacks? (Choose two.)
What are two methods of mitigating MAC address flooding attacks? (Choose two.)
A.
Place unused ports in a common VLAN.
B.
Implement private VLANs.
C.
Implement DHCP snooping.
D.
Implement port security.
E.
Implement VLAN access maps.