What three steps should be implemented in the network to mitigate a VLAN hopping attack? (Choose three.)
- Enable DTP on all access ports.
- Specify the VLAN range on trunk links.
- Configure all unused ports as access ports.
- Place all unused ports in the shutdown state.
- Configure VLAN 1 as the native VLAN for all trunks.
Exam with this question: CCNP SWITCH Chapter 10 Exam Answers
Please login or Register to submit your answer