You work as a network engineer for. You study the exhibit carefully. <br /> What type of attack would be mitigated by this configuration?()<br /> <img src="https://nimg.ppkao.com/2018-07/gelingxia/201807301624156941.jpg?sign=588db6c1d50cccb587fe26f7e392592f&t=62d46a4a" />
A、CDP manipulation
B、VLAN hopping
C、MAC spoofing
D、MAC flood attack
E、ARP spoofing
F、spanning tree compromises