What are two methods of mitigating MAC address flooding attacks?()

A . Place unused ports in a common VLAN. B . Implement private VLANs. C . Implement DHCP snooping. D . Implement port security. E . Implement VLAN access maps.

时间:2022-11-04 13:55:08 所属题库:CCNP(642-813)题库

相似题目