Which two configuration statements can be used to mitigate VLAN hopping?

A concern has been expressed that the switched infrastructure in an integrated network is vulnerable to VLAN hopping attacks. Which two configuration statements can be used to mitigate VLAN hopping? (Choose two.)

A concern has been expressed that the switched infrastructure in an integrated network is vulnerable to VLAN hopping attacks. Which two configuration statements can be used to mitigate VLAN hopping? (Choose two.)

A.
switchport port-security

B.
switchport port-security tagging

C.
switchport access vlan

D.
switchport double-tag snooping

E.
switchport mode access



Leave a Reply 0

Your email address will not be published. Required fields are marked *