Which configuration method can prevent these attacks?

Posted by: Pdfprep Category: H12-224-ENU Tags: , ,

Man-in-the-middle attacks or IP/MAC Spoofing attacks are common on intra nets and will cause information leakage.

Which configuration method can prevent these attacks?
A . Configure the trusted or untrusted interface.
B . Limit the maximum number of MAC addresses that can be learned on a switch interface.
C . Configure DHCP snooping to check the CHADDR field carried in a DHCP Request packet.
D . Configure association between DHCP snooping and IPSG or DAI on the switch.

Answer: D

Leave a Reply

Your email address will not be published.