Which devices should be secured to mitigate against MAC address spoofing attacks?
- Layer 7 devices
- Layer 4 devices
- Layer 2 devices
- Layer 3 devices
Answers Explanation & Hints:
Layer 2 attacks such as MAC address spoofing can be mitigated by securing Layer 2 devices. |