When configured in accordance to Cisco best practices, the ip verify source command can mitigate
which two types of Layer 2 attacks? (Choose two.)
A.
rogue DHCP servers
B.
ARP attacks
C.
DHCP starvation
D.
MAC spoofing
E.
CAM attacks
F.
IP spoofing
Answer is correct:
“IP source guard is a security feature that filters traffic based on the DHCP snooping binding database and on manually configured IP source bindings in order to restrict IP traffic on non-routed Layer 2 interfaces. You can use IP source guard to prevent traffic attacks caused when a host tries to use the IP address of its neighbor. IP source guard prevents IP/MAC spoofing2
https://www.cisco.com/c/en/us/support/docs/switches/catalyst-3750-series-switches/72846-layer2-secftrs-catl3fixed.html