What are two methods of mitigating MAC address flooding attacks?

What are two methods of mitigating MAC address flooding attacks? (Choose two.) Select 2 response(s).

What are two methods of mitigating MAC address flooding attacks? (Choose two.) Select 2 response(s).

A.
Place unused ports in a common VLAN.

B.
Implement private VLANs.

C.
Implement DHCP snooping.

D.
Implement port security.

E.
Implement VLAN access maps.



Leave a Reply 0

Your email address will not be published. Required fields are marked *