A customer suspects someone or something is changing the MAC address of a virtual machine.
Which security policy should the customer modify to obtain more information?
A . Discovery Protocol
B . Promiscuous Mode
C . Forged Transmits
D . MAC Address Change
Answer: B