You have been hired by Acme Corporation to evaluate their existing network and determine if
the current network design is secure enough to prevent man-in-the-middle attacks. When
evaluating the network, which switch security option should you investigate to ensure that
authorized ARP responses take place according to known IP-to-MAC address mapping?
A.
ARP rate limiting
B.
DHCP snooping
C.
Dynamic ARP Inspections
D.
IP Source Guard