When it is configured in accordance to Cisco best practices, the switchport port-security maximum
command can mitigate which two types of Layer 2 attacks? (Choose two.)
A.
rogue DHCP servers
B.
ARP attacks
C.
DHCP starvation
D.
MAC spoofing
E.
CAM attacks
F.
IP spoofing
Correct !
Answer is correct:
“You can use the port security feature to limit and identify MAC addresses of the stations allowed to access the port. This restricts input to an interface”
https://www.cisco.com/c/en/us/support/docs/switches/catalyst-3750-series-switches/72846-layer2-secftrs-catl3fixed.html