问题:
You are implementing basic switch security best practices.
Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()
A . Make all ports private VLAN ports.
B . Place all unused ports in native VLAN 1 until needed.
C . Proactively configure unused switch ports as access ports.
D . Disable Cisco Discovery Protocol globally.
You are implementing basic switch security best practices.
Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()
● 参考解析
本题暂无解析