Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?

You are implementing basic switch security best practices. Which of these is a tactic that you
can use to mitigate compromises from being launched through the switch?

You are implementing basic switch security best practices. Which of these is a tactic that you
can use to mitigate compromises from being launched through the switch?

A.
Make all ports private VLAN ports.

B.
Place all unused ports in native VLAN 1 until needed.

C.
Proactively configure unused switch ports as access ports.

D.
Disable Cisco Discovery Protocol globally.

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *