subject
Computers and Technology, 03.01.2020 06:31 noaj94

Which two security measures must an engineer follow then implementing layer 2 and layer 3 network design?

a. utilize the native vlan only on trunk ports to reduce the risk of an double-tagged 802.1q vlan hopping attack
b. utilize an access list to prevent the use of arp to modify entries to the table
c. utilize dhcp snooping on a per vlan basis an apply ip dhcp snooping untrusted on all ports
d. utilize the arp inspection feature to prevent the misuse of garpe. utilize private vlans an ensure that all ports are part of the isolated port group

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 20:10
Leo is a recruitment executive for a large company. he has identified new labor resource requirements in both the marketing and production departments. what should be his first step in recruiting candidates for the positions? a. conduct background checks of candidates b. make job offers c. arrange interviews d. conduct reference checks e. place job ads on job sites
Answers: 1
question
Computers and Technology, 24.06.2019 16:00
Your is an example of personal information that you should keep private.
Answers: 2
question
Computers and Technology, 24.06.2019 19:20
Which command suppresses the visibility of a particular row or column in a worksheet?
Answers: 1
question
Computers and Technology, 25.06.2019 02:30
Technology has changed communications by replacing or supplementing traditional modes of communication that were primarily
Answers: 2
You know the right answer?
Which two security measures must an engineer follow then implementing layer 2 and layer 3 network de...
Questions
question
Mathematics, 27.08.2019 20:30
question
History, 27.08.2019 20:30
question
Geography, 27.08.2019 20:30