Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
This type of Port Scanning technique splits TCP header into several packets so that the packet filters are not able to detect what the packets intends to do.