An administrator wants to prevent a rogue Layer 2 device from intercepting traffic from multiple VLANs on a network. Which two actions help mitigate this type of activity? (Choose two.)

IT Questions BankCategory: CCNA Security v1.2An administrator wants to prevent a rogue Layer 2 device from intercepting traffic from multiple VLANs on a network. Which two actions help mitigate this type of activity? (Choose two.)

An administrator wants to prevent a rogue Layer 2 device from intercepting traffic from multiple VLANs on a network. Which two actions help mitigate this type of activity? (Choose two.)

  • Disable DTP on ports that require trunking.
  • Place unused active ports in an unused VLAN.
  • Secure the native VLAN, VLAN 1, with encryption.
  • Set the native VLAN on the trunk ports to an unused VLAN.
  • Turn off trunking on all trunk ports and manually configure each VLAN as required on each port.

Exam with this question: CCNA Security Chapter 6 Exam (CCNAS v1.2)
Exam with this question: CCNA Security Final Exam (CCNAS v1.2)

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments