Which of the following would be BEST to use to detect a MAC spoofing attack?
Which of the following would be BEST to use to detect a MAC spoofing attack?A . Internet Control Message Protocol B. Reverse Address Resolution Protocol C. Dynamic Host Configuration Protocol D. Internet Message Access ProtocolView AnswerAnswer: B