CompTIA Network+ N10-008 – Question002

Which of the following would be BEST to use to detect a MAC spoofing attack?


A.
Internet Control Message Protocol
B. Reverse Address Resolution Protocol
C. Dynamic Host Configuration Protocol
D. Internet Message Access Protocol

Correct Answer: B