Exam4Training

According to security best practices, which two actions must you take to protect an unused switch port? (Choose two)

According to security best practices, which two actions must you take to protect an unused switch port? (Choose two)
A . Enable CDP
B . Configure the port as an access port on a VLAN other than VLAN 1
C . Administratively shut down the port
D . Configure the port as a trunk port
E . Configure the port to automatically come online

Answer: BC

Latest 200-125 Dumps Valid Version with 759 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version