Which statement is true about Layer 2 security threats?
Many security administrators don’t think of security when it comes to Layer 2 of the network infrastructure (where switches operate), and it’s one of the most overlooked aspects of network security and reliability. Which statement is true about Layer 2 security threats?