What method helps mitigate the threat of IP spoofing?
A.
logging
B.
SNMP polling
C.
Layer 2 switching
D.
access control
What method helps mitigate the threat of IP spoofing?
What method helps mitigate the threat of IP spoofing?
A.
logging
B.
SNMP polling
C.
Layer 2 switching
D.
access control