Posted by: Pdfprep
Post Date: December 12, 2020
When configured in accordance to Cisco best practices, the ip verify source command can mitigate which two types of Layer 2 attacks? (Choose two.)
A . rogue DHCP servers
B . ARP attacks
C . DHCP starvation
D . MAC spoofing
E . CAM attacks
F . IP spoofing
Answer: D,F
Leave a Reply