According to security best practices, which two actions must you take to protect an unused switch port? (Choose two.)

Questions BankAccording to security best practices, which two actions must you take to protect an unused switch port? (Choose two.)
According to security best practices, which two actions must you take to protect an unused switch port? (Choose two.) 1ITExamAnswers Staff asked 6 months ago
Question:
According to security best practices, which two actions must you take to protect an unused switch port? (Choose two.)

  • Configure the port as an access port on a VLAN other than VLAN 1
  • Configure the port as a trunk port
  • Enable CDP
  • Configure the port to automatically come online
  • Administratively shut down the port

More Questions: CCNA v3.0 (200-125) Study Guide – Exam Dumps


Related Articles