A security administrator must implement a network that is immune to ARP spoofing attacks. Which
of the following should be implemented to ensure that a malicious insider will not be able to
successfully use ARP spoofing techniques?

A.
UDP
B.
IPv6
C.
IPSec
D.
VPN
Explanation:
ARP is not used in IPv6 networks.
The Address Resolution Protocol (ARP) is a telecommunication protocol used for resolution of
network layer addresses into link layer addresses, a critical function in multiple-access networks.
ARP is used for converting a network address (e.g. an IPv4 address) to a physical address like an
Ethernet address (also named a MAC address).
In Internet Protocol Version 6 (IPv6) networks, the functionality of ARP is provided by the Neighbor
Discovery Protocol (NDP).