The Company is concerned about Layer 2 security threats. Which statement is true about these threats? ()
- A MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.
- B Port scanners are the most effective defense against dynamic ARP inspection.
- C MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable attack points.
- D Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks.
- E DHCP snooping sends unauthorized replies to DHCP queries.
- F ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.
- G None of the other alternatives apply.