The network administrator sees a “%CAM-TABLE-FULL” message on a network switch. Upon investigation, the administrator notices thousands of MAC addresses
associated with a single untagged port. Which of the following should be implemented to prevent this type of attack?
A.
Port security
B.
BPDU guard
C.
802.1X
D.
TACACS+