A networking team must harden an organization's network from VLAN hopping attacks. The team disables Dynamic Trunking Protocol and puts any unused ports in an unused VLAN. A trunk port is used as a trunk link. What must the team configure next to harden the network against VLAN hopping attacks?
aa4a63c
1 month agoPremium_Pils
7 months, 3 weeks agoluismg
7 months, 1 week ago