PdfPrep.com

Which configuration method can prevent these attacks?

Man-in-the-middle attacks or IP/MAC Spoofing attacks are common on intra nets and will cause information leakage.

Which configuration method can prevent these attacks?
A . Configure the trusted or untrusted interface.
B . Limit the maximum number of MAC addresses that can be learned on a switch interface.
C . Configure DHCP snooping to check the CHADDR field carried in a DHCP Request packet.
D . Configure association between DHCP snooping and IPSG or DAI on the switch.

Answer: D

Exit mobile version