Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
Configure Port Security on the switch
Configure Port Recon on the switch
Configure Switch Mapping
Configure Multiple Recognition on the switch
Submit