What are two features that can stop man-in-the-middle attacks? (Choose two.)
A.
DCHP snooping
B.
ARP snooping
C.
dynamic MAC ACLs
D.
destination MAC ACLs
E.
ARP sniffing on specific ports
What are two features that can stop man-in-the-middle attacks? (Choose two.)
What are two features that can stop man-in-the-middle attacks? (Choose two.)
A.
DCHP snooping
B.
ARP snooping
C.
dynamic MAC ACLs
D.
destination MAC ACLs
E.
ARP sniffing on specific ports