An organization wants to minimize the risk of an attacker using IP spoofing to impersonate another host within its network. What is the BEST strategy to employ on their network infrastructure to mitigate this risk?
Restrict physical access to network devices.
Enforce strong password policies for device access.
Deploy anti-malware software on all endpoint devices.
Implement ingress filtering on network devices.