VLAN Hopping is one of the primary VLAN based attacks used by hackers to infiltrate network security. VLAN hopping is used to attack a network by sending packets to a port which is generally not accessible. VLAN hopping attacks are mainly conducted in the Dynamic Trunking Protocol and, in some cases; the attacks are targeted to the trunking encapsulation protocol (802.1 q or ISL).You worry about the switched infrastructure in an integrated network is vulnerable to VLAN hopping attacks. Which two configuration can be used to mitigate VLAN hopping? (Choose two.)
A.
switchporttrunk encapsulation
B.
switchport mode trunk
C.
switchport access vlan
D.
switchport mode access