A.enables PortFast B.disables trunking C.disables Cisco Discovery Protocol D.enables port security E.enables loopguard F.disables EtherChannel
You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()
A.Make all ports private VLAN ports. B.Place all unused ports in native VLAN 1 until needed. C.Proactively configure unused switch ports as access ports. D.Disable Cisco Discovery Protocol globally.
Three Cisco Catalyst switches have been configured with a first-hop redundancy protocol. While reviewing some show commands, debug output, and the syslog, you discover the following information: What conclusion can you infer from this information?()
A.VRRP is initializing and operating correctly. B.HSRP is not properly exchanging three hello messages. C.VRRP is not properly exchanging three hello messages. D.HSRP is initializing and operating correctly. E.GLBP is not properly exchanging three hello messages. F.GLBP is initializing and operating correctly.