Which two countermeasures can mitigate MAC spoofing attacks?

Which two countermeasures can mitigate MAC spoofing attacks? (Choose two.)

Which two countermeasures can mitigate MAC spoofing attacks? (Choose two.)

A.
IP source guard

B.
port security

C.
root guard

D.
BPDU guard

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *

16 − 2 =