What is the MOST effective method to counteract an attack that involves falsifying the link between IP addresses and MAC addresses on a network?
Implement static entries for all critical devices.
Clear the mapping table at regular short intervals.
Use antivirus programs on all network devices.