Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level
LPI Level 1
LPI Level 2
LPI Level 3
Contact
you suspect an attacker in your network has configured a rogue layer 2
Which two methods will help to mitigate this type of activity?