Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic between point A and B?