Many security administrators don’t think of security when it comes to Layer 2 of the network infrastructure (where switches operate), and it’s one of the most overlooked aspects of network security and reliability. Which statement is true about Layer 2 security threats?
A.
ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.
B.
DHCP snooping sends unauthorized replies to DHCP queries
C.
MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable attack points.
D.
MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.