Company GHI consolidated their network distribution so twelve network VLANs would be available
over dual fiber links to a modular L2 switch in each of the company’s six IDFs. The IDF modular
switches have redundant switch fabrics and power supplies. Which of the following threats will
have the GREATEST impact on the network and what is the appropriate remediation step?
A.
Threat: 802.1q trunking attack
Remediation: Enable only necessary VLANs for each port
B.
Threat: Bridge loop
Remediation: Enable spanning tree
C.
Threat: VLAN hopping
Remediation: Enable only necessary VLANs for each port
D.
Threat: VLAN hopping
Remediation: Enable ACLs on the IDF switch