Refer to the exhibit. The ip verify source command is applied on untrusted interfaces. Which type of attack is mitigated by using this configuration?​

Last Updated on June 17, 2021 by Admin

Refer to the exhibit. The ip verify source command is applied on untrusted interfaces. Which type of attack is mitigated by using this configuration?​

Network Security (Version 1) - Network Security 1.0 Final Exam Answers 06
Network Security (Version 1) – Network Security 1.0 Final Exam Answers 06
  • DHCP starvation​
  • DHCP spoofing​
  • STP manipulation
  • MAC and IP address spoofing
    Answers Explanation & Hints:

    To protect against MAC and IP address spoofing, apply the IP Source Guard security feature, using the ip verify source command, on untrusted ports.

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments