An administrator wants to prevent a rogue Layer 2 device from intercepting traffic from multiple VLANs on a network. Which two actions help mitigate this type of activity? (Choose two.)
- Disable DTP on ports that require trunking.
- Place unused active ports in an unused VLAN.
- Secure the native VLAN, VLAN 1, with encryption.
- Set the native VLAN on the trunk ports to an unused VLAN.
- Turn off trunking on all trunk ports and manually configure each VLAN as required on each port.
Exam with this question: CCNA Security Chapter 6 Exam (CCNAS v1.2)
Exam with this question: CCNA Security Final Exam (CCNAS v1.2)
Please login or Register to submit your answer