• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Refer to the exhibit. The ip verify source command is applied on untrusted interfaces. Which type of attack is mitigated by using this configuration?​

Network Security (Version 1) - Network Security 1.0 Final Exam Answers 06
Network Security (Version 1) – Network Security 1.0 Final Exam Answers 06
  • DHCP starvation​
  • DHCP spoofing​
  • STP manipulation
  • MAC and IP address spoofing
    Answers Explanation & Hints:

    To protect against MAC and IP address spoofing, apply the IP Source Guard security feature, using the ip verify source command, on untrusted ports.

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments