What three steps should be implemented in the network to mitigate a VLAN hopping attack? (Choose three.)

IT Questions BankCategory: CCNPWhat three steps should be implemented in the network to mitigate a VLAN hopping attack? (Choose three.)

What three steps should be implemented in the network to mitigate a VLAN hopping attack? (Choose three.)

  • Enable DTP on all access ports.
  • Specify the VLAN range on trunk links.
  • Configure all unused ports as access ports.
  • Place all unused ports in the shutdown state.
  • Configure VLAN 1 as the native VLAN for all trunks.

Exam with this question: CCNP SWITCH Chapter 10 Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments