Posted by: Pdfprep
Post Date: November 22, 2020
Man-in-the-middle attacks or IP/MAC Spoofing attacks are common on intra nets and will cause information leakage.
Which configuration method can prevent these attacks?
A . Configure the trusted or untrusted interface.
B . Limit the maximum number of MAC addresses that can be learned on a switch interface.
C . Configure DHCP snooping to check the CHADDR field carried in a DHCP Request packet.
D . Configure association between DHCP snooping and IPSG or DAI on the switch.
Answer: D
Leave a Reply