What should be implemented to mitigate man-in-middle attacks in the data access layer?
A.
VACLs
B.
PVLANs
C.
Reverse Path Forwarding
D.
Dynamic ARP Inspection
What should be implemented to mitigate man-in-middle attacks in the data access layer?
What should be implemented to mitigate man-in-middle attacks in the data access layer?
A.
VACLs
B.
PVLANs
C.
Reverse Path Forwarding
D.
Dynamic ARP Inspection