According to security best practices, which two actions must you take to protect an unused switch port? (Choose two.)

IT Questions BankAccording to security best practices, which two actions must you take to protect an unused switch port? (Choose two.)

Question:
According to security best practices, which two actions must you take to protect an unused switch port? (Choose two.)

  • Configure the port as an access port on a VLAN other than VLAN 1
  • Configure the port as a trunk port
  • Enable CDP
  • Configure the port to automatically come online
  • Administratively shut down the port

Exam with this question: CCNA v3.0 (200-125) Study Guide – Exam Dumps

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x