Refer to the exhibit. An attacker is connected to interface Fa0/11 on switch A-SW2 and attempts to establish a DHCP server for a man-in-middle attack. Which recommendation, if followed, would mitigate this type of attack?
Select the best response.
A.
All switch ports in the Building Access block should be configured as DHCP trusted ports.
B.
All switch ports in the Building Access block should be configured as DHCP untrusted ports.
C.
All switch ports connecting to hosts in the Building Access block should be configured as
DHCP trusted ports.
D.
All switch ports connecting to hosts in the Building Access block should be configured as DHCP untrusted ports.
E.
All switch ports in the Server Farm block should be configured as DHCP untrusted ports.
F.
All switch ports connecting to servers in the Server Farm block should be configured as DHCP untrusted ports.
Why not A?
And if there is a port used for phones? Why would you trust that user?
Got it! The uplink should be trusted.