Which two methods will help to mitigate this type of activity?

Look at the exhibit:
You suspect an attacker in your network has configured a rogue layer 2 device to intercept traffic from multiple VLANS, thereby allowing the attacker to capture potentially sensitive data. Which two methods will help to mitigate this type of activity? (Choose two.)

Look at the exhibit:
You suspect an attacker in your network has configured a rogue layer 2 device to intercept traffic from multiple VLANS, thereby allowing the attacker to capture potentially sensitive data. Which two methods will help to mitigate this type of activity? (Choose two.)

A.
Turn off all trunk ports and manually configure each VLAN as required on each port

B.
Disable DTP on ports that require trunking

C.
Secure the native VLAN, VLAN 1 with encryption

D.
Set the native VALN on the trunk ports to an unused VLAN

E.
Place unused active ports in an unused VLAN



Leave a Reply 1

Your email address will not be published. Required fields are marked *