Cisco Exam Questions

Which two methods will help to mitigate this type of activity?

You suspect that an attacker in your network has configured a rogue Layer 2 device to intercept traffic from multiple VLANs, which allows the attacker to capture potentially sensitive data.

Which two methods will help to mitigate this type of activity? (Choose two.)

A.
Turn off all trunk ports and manually configure each VLAN as required on each port.

B.
Place unused active ports in an unused VLAN.

C.
Secure the native VLAN, VLAN 1, with encryption.

D.
Set the native VLAN on the trunk ports to an unused VLAN.

E.
Disable DTP on ports that require trunking.

Explanation: