An organization wants to minimize the risk of an attacker using IP spoofing to impersonate another host within its network. What is the BEST strategy to employ on their network infrastructure to mitigate this risk?
Implement ingress filtering on network devices.
Enforce strong password policies for device access.
Restrict physical access to network devices.
Deploy anti-malware software on all endpoint devices.