Question:
According to security best practices, which two actions must you take to protect an unused switch port? (Choose two.)
- Configure the port as an access port on a VLAN other than VLAN 1
- Configure the port as a trunk port
- Enable CDP
- Configure the port to automatically come online
- Administratively shut down the port
Exam with this question: CCNA v3.0 (200-125) Study Guide – Exam Dumps
Please login or Register to submit your answer