Which of the following would be BEST to use to detect a MAC spoofing attack?
A. Internet Control Message Protocol
B. Reverse Address Resolution Protocol
C. Dynamic Host Configuration Protocol
D. Internet Message Access Protocol
Which of the following would be BEST to use to detect a MAC spoofing attack?
A. Internet Control Message Protocol
B. Reverse Address Resolution Protocol
C. Dynamic Host Configuration Protocol
D. Internet Message Access Protocol
You must be logged in to post a comment.