Which two configuration statements can be used to mitigate VLAN hopping?

A concern has been expressed that the switched infrastructure in an integrated network is vulnerable to VLAN hopping attacks. Which two configuration statements can be used to mitigate VLAN hopping? (Choose two.)

A concern has been expressed that the switched infrastructure in an integrated network is vulnerable to VLAN hopping attacks. Which two configuration statements can be used to mitigate VLAN hopping? (Choose two.)

A.
switch port port-security

B.
switch port port-security tagging

C.
switch port access vlan

D.
switch port double tag snooping

E.
switch port mode access



Leave a Reply 0

Your email address will not be published. Required fields are marked *