Last Updated on June 17, 2021 by Admin
Refer to the exhibit. The ip verify source command is applied on untrusted interfaces. Which type of attack is mitigated by using this configuration?
- DHCP starvation
- DHCP spoofing
- STP manipulation
- MAC and IP address spoofing
Answers Explanation & Hints:
To protect against MAC and IP address spoofing, apply the IP Source Guard security feature, using the ip verify source command, on untrusted ports.