What type of attack would be mitigated by this configuration?
A.
ARP spoofing
B.
MAC spoofing
C.
VLAN hopping
D.
CDP manipulation
E.
MAC flood attack
F.
spanning tree compromises
What type of attack would be mitigated by this configuration?
A.
ARP spoofing
B.
MAC spoofing
C.
VLAN hopping
D.
CDP manipulation
E.
MAC flood attack
F.
spanning tree compromises