According to security best practices, which two actions must you take to protect an unused switch port? (Choose two)

According to security best practices, which two actions must you take to protect an unused switch port? (Choose two)
A . Enable CDP
B . Configure the port as an access port on a VLAN other than VLAN 1
C . Administratively shut down the port
D . Configure the port as a trunk port
E . Configure the port to automatically come online

Answer: BC

Latest 200-125 Dumps Valid Version with 759 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments