Which two countermeasures can mitigate MAC spoofing attacks? (Choose two.)
A.
IP source guard
B.
port security
C.
root guard
D.
BPDU guard
Explanation:
Which two countermeasures can mitigate MAC spoofing attacks? (Choose two.)
Which two countermeasures can mitigate MAC spoofing attacks? (Choose two.)
A.
IP source guard
B.
port security
C.
root guard
D.
BPDU guard
Explanation: