A network administrator notices that there are unknown devices connected to the network. After investigation, they conclude that someone is spoofing MAC addresses on the local network to bypass MAC filtering on the Layer 2 switch. Which feature should the administrator enable on the switch to prevent this type of activity?
Port Security
Dynamic ARP Inspection (DAI)
DHCP Snooping
IP Source Guard