PrepAway - Latest Free Exam Questions & Answers

Which two methods will help to mitigate this type of activity?

You suspect an attacker in your network has configured a rogue layer 2 device to intercept traffic
from multiple VLANS, thereby allowing the attacker to capture potentially sensitive data. Which
two methods will help to mitigate this type of activity? (Choose two.)

PrepAway - Latest Free Exam Questions & Answers

A.
Turn off all trunk ports and manually configure each VLAN as required on each port

B.
Disable DTP on ports that requiretrunking

C.
Secure the native VLAN, VLAN 1 with encryption

D.
Set the native VLAN on the trunk ports to an unused VLAN

E.
Place unused active ports in an unused VLAN


Leave a Reply