Exam4Training

Man-in-the-middle attacks or IP/MAC spoofing attacks can cause information leakage and other hazards, and they are more common in intranets.

Man-in-the-middle attacks or IP/MAC spoofing attacks can cause information leakage and other hazards, and they are more common in intranets.

In order to prevent man-in-the-middle attacks or IP/MAC spoofing attacks, the configuration methods that can be taken are:
A . Configure Trusted/Untrusted interface.
B . Limit the maximum number of MAC addresses that can be learned on the switch interface.
C . Enable DHCP snooping to check the function of CHADDR field in the DHCP REQUEST message.
D . Configure the linkage between DHCP snooping and DAI or IPSG on the switch.

Answer: D

Exit mobile version