Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
A.
Port Security
B.
Switch Mapping
C.
Port Reconfiguring
D.
Multiple Recognition
Explanation:
:
You must be logged in to post a comment.
A