Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
A.
Port Security
B.
Switch Mapping
C.
Port Reconfiguring
D.
Multiple Recognition
Explanation:
With Port Security the switch will keep track of which ports are allowed to send traffic on a port.