1. Which of the following mitigation techniques are used to protect Layer 3 through Layer 7 of the OSI Model? (Choose three.)
- DHCP snooping
- VPN
- Firewalls
- IPSG
- IPS devices
2. Which of the following mitigation techniques prevents many types of attacks including MAC address table overflow and DHCP starvation attacks?
- IPSG
- DHCP snooping
- DAI
- Port security
3. Which of the following mitigation techniques prevents MAC and IP address spoofing?
- IPSG
- DHCP snooping
- DAI
- Port security
4. Which of the following mitigation techniques prevents ARP spoofing and ARP poisoning attacks?
- IPSG
- DHCP snooping
- DAI
- Port security
5. Which of the following mitigation techniques prevents DHCP starvation and DHCP spoofing attacks?
- IPSG
- DHCP snooping
- DAI
- Port security