Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?

You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch? Select the best response.

You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch? Select the best response.

A.
Make all ports private VLAN ports.

B.
Place all unused ports in native VLAN 1 until needed.

C.
Proactively configure unused switch ports as access ports.

D.
Disable Cisco Discovery Protocol globally.



Leave a Reply 0

Your email address will not be published. Required fields are marked *