which two types of Layer 2 attacks?

When configured in accordance to Cisco best practices, the ip verify source command can mitigate
which two types of Layer 2 attacks? (Choose two.)

When configured in accordance to Cisco best practices, the ip verify source command can mitigate
which two types of Layer 2 attacks? (Choose two.)

A.
rogue DHCP servers

B.
ARP attacks

C.
DHCP starvation

D.
MAC spoofing

E.
CAM attacks

F.
IP spoofing



Leave a Reply 1

Your email address will not be published. Required fields are marked *


JackP

JackP

Answer is correct:

“IP source guard is a security feature that filters traffic based on the DHCP snooping binding database and on manually configured IP source bindings in order to restrict IP traffic on non-routed Layer 2 interfaces. You can use IP source guard to prevent traffic attacks caused when a host tries to use the IP address of its neighbor. IP source guard prevents IP/MAC spoofing2

https://www.cisco.com/c/en/us/support/docs/switches/catalyst-3750-series-switches/72846-layer2-secftrs-catl3fixed.html