What are two methods of mitigating MAC address flooding attacks?
What are two methods of mitigating MAC address flooding attacks? (Choose two.) Select 2 response(s).
                
           What are two methods of mitigating MAC address flooding attacks? (Choose two.) Select 2 response(s).