According to security best practices, which two actions must you take to protect an unused switch port? (Choose two)

According to security best practices, which two actions must you take to protect an unused switch port? (Choose two)
A . Enable CDP
B . Administratively shutdown the port
C . Configure the port as an access port on a VLAN other than VLAN 1
D . Configure the port to automatically come online.
E . Configure the port as a trunk port

Answer: BC

Latest 200-125 Dumps Valid Version with 759 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments