Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
A . Configure Port Security on the switch
B . Configure Port Recon on the switch
C . Configure Switch Mapping
D . Configure Multiple Recognition on the switch
Answer: A