When configured in accordance to Cisco best practices, the ip verify source command can
mitigate which two types of Layer 2 attacks? (Choose two.)
A.
rogue DHCP servers
B.
ARP attacks
C.
DHCP starvation
D.
MAC spoofing
E.
CAM attacks
F.
IP spoofing
When configured in accordance to Cisco best practices, the ip verify source command can
mitigate which two types of Layer 2 attacks? (Choose two.)
When configured in accordance to Cisco best practices, the ip verify source command can
mitigate which two types of Layer 2 attacks? (Choose two.)
A.
rogue DHCP servers
B.
ARP attacks
C.
DHCP starvation
D.
MAC spoofing
E.
CAM attacks
F.
IP spoofing
Correct !