Which two countermeasures can mitigate MAC spoofing attacks?

Which two countermeasures can mitigate MAC spoofing attacks? (Choose two.)

Which two countermeasures can mitigate MAC spoofing attacks? (Choose two.)

A.
IP source guard

B.
port security

C.
root guard

D.
BPDU guard



Leave a Reply 0

Your email address will not be published. Required fields are marked *