Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?

IT Questions BankRefer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?

Question:
Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?

  • Disable autonegotiation and set ports to either static access or static trunk.
  • Change the native VLAN to a fixed VLAN that is distinct from all user VLANs and to a VLAN number that is not VLAN 1.
  • Configure all unused ports to a ‘black-hole’ VLAN that is not used for anything on the network.
  • All user ports are associated with VLANs distinct from VLAN 1 and distinct from the ‘black-hole’ VLAN.

Exam with this question: CCNA 2 (v5.0.3 + v6.0) Chapter 3 Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments