Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
A . Configure Port Security on the switch
B . Configure Port Recon on the switch
C . Configure Switch Mapping
D . Configure Multiple Recognition on the switch
Answer: A
Latest CEH-001 Dumps Valid Version with 878 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund