A malicious user is using special software to perform an on-path attack. Which of the following best practices
should be configured to mitigate this threat?
A. Dynamic ARP inspection
B. Role-based access
C. Control plane policing
D. MAC filtering
should be configured to mitigate this threat?
A. Dynamic ARP inspection
B. Role-based access
C. Control plane policing
D. MAC filtering