Refer to the exhibit. The ip verify source command is applied on untrusted interfaces. Which type of attack is mitigated by using this configuration?
- DHCP spoofing
- DHCP starvation
- STP manipulation
- MAC and IP address spoofing
Explanation: To protect against MAC and IP address spoofing, apply the IP Source Guard security feature, using the ip verify source command, on untrusted ports.
Exam with this question: CCNA Security Final Exam Answers
Exam with this question: Network Security Final Exam Answers
Please login or Register to submit your answer