A.isolated B.protected C.private D.associated E.promiscuous F.munity
A.enables PortFast B.disables trunking C.disables Cisco Discovery Protocol D.enables port security E.enables loopguard F.disables EtherChannel
You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()
A.Make all ports private VLAN ports. B.Place all unused ports in native VLAN 1 until needed. C.Proactively configure unused switch ports as access ports. D.Disable Cisco Discovery Protocol globally.