Question:
According to security best practices, which two actions must you take to protect an unused switch port? (Choose two.)
According to security best practices, which two actions must you take to protect an unused switch port? (Choose two.)
- Configure the port as an access port on a VLAN other than VLAN 1
- Configure the port as a trunk port
- Enable CDP
- Configure the port to automatically come online
- Administratively shut down the port
More Questions: CCNA v3.0 (200-125) Study Guide – Exam Dumps
Please login or Register to submit your answer