Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
Can June use an antivirus program in this case and would it be effective against a polymorphic virus?