Which of the following countermeasure can specifically protect against both the MAC Flood and
MAC Spoofing attacks?
A.
Configure Port Security on the switch
B.
Configure Port Recon on the switch
C.
Configure Switch Mapping
D.
Configure Multiple Recognition on the switch
Answer A.
Configure Port Security on the switch
A configure port security limits requests made for mac or ip requests. 130,000 per second threshold configured to deny requests that are untimely.