PrepAway - Latest Free Exam Questions & Answers

Which two methods will help to mitigate this type of activity?

Look at the exhibit:
You suspect an attacker in your network has configured a rogue layer 2 device to intercept traffic from multiple VLANS, thereby allowing the attacker to capture potentially sensitive data. Which two methods will help to mitigate this type of activity? (Choose two.)

PrepAway - Latest Free Exam Questions & Answers

A.
Turn off all trunk ports and manually configure each VLAN as required on each port

B.
Disable DTP on ports that require trunking

C.
Secure the native VLAN, VLAN 1 with encryption

D.
Set the native VALN on the trunk ports to an unused VLAN

E.
Place unused active ports in an unused VLAN

One Comment on “Which two methods will help to mitigate this type of activity?


Leave a Reply