A security administrator must implement a network that is immune to ARP spoofing attacks. Which
of the following should be implemented to ensure that a malicious insider will not be able to
successfully use ARP spoofing techniques?
A.
UDP
B.
IPv6
C.
IPSec
D.
VPN