When configured in accordance to Cisco best practices, the ip verify source command can mitigate which two types of Layer 2 attacks? (Choose two.)

Posted by: Pdfprep Category: 300-206 Tags: , ,

When configured in accordance to Cisco best practices, the ip verify source command can mitigate which two types of Layer 2 attacks? (Choose two.)
A . rogue DHCP servers
B . ARP attacks
C . DHCP starvation
D . MAC spoofing
E . CAM attacks
F . IP spoofing

Answer: D,F

Leave a Reply

Your email address will not be published.