A security administrator must implement a network that is immune to ARP spoofing attacks. Which of the
following should be implemented to ensure that a malicious insider will not be able to successfully use ARP
spoofing techniques?

A.
UDP
B.
IPv6
C.
IPSec
D.
VPN
Explanation:
ARP is not used in IPv6 networks.
The Address Resolution Protocol (ARP) is a telecommunication protocol used for resolution of network layer
addresses into link layer addresses, a critical function in multiple-access networks. ARP is used for converting
a network address (e.g. an IPv4 address) to a physical address like an Ethernet address (also named a MAC
address).
In Internet Protocol Version 6 (IPv6) networks, the functionality of ARP is provided by the Neighbor Discovery
Protocol (NDP).