Which two countermeasures can mitigate MAC spoofing attacks? (Choose two.)
A.
IP source guard
B.
port security
C.
root guard
D.
BPDU guard
Which two countermeasures can mitigate MAC spoofing attacks? (Choose two.)
Which two countermeasures can mitigate MAC spoofing attacks? (Choose two.)
A.
IP source guard
B.
port security
C.
root guard
D.
BPDU guard