You have been hired by Acme Corporation to evaluate their existing network and determine if the
current network design is secure enough to prevent man-in-the-middle attacks. When evaluating
the network, which switch security option should you investigate to ensure that authorized ARP
responses take place according to known IP-to-MAC address mapping?
A.
ARP rate limiting
B.
DHCP snooping
C.
Dynamic ARP Inspections
D.
IP Source Guard