How can VLAN hopping attacks be prevented on a network??

A. ?Install an additional switch to isolate traffic.
B. ?Disable auto trunking and move native VLANs to unused VLANs.
C. ?Install a router to process the untagged traffic on the VLAN.
D. ?Use MAC address filtering.


Answer: B

Computer Science & Information Technology

You might also like to view...

A new class of objects can be created conveniently by ________; the new class (called the ________) starts with the characteristics of an existing class (called the ________), possibly customizing them and adding unique characteristicsof its own.

a. inheritance, superclass, subclass. b. composition, subclass, superclass c. inheritance, subclass, superclass d. composition, superclass, subclass

Computer Science & Information Technology

_______ are problems with no practical algorithmic solutions.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The placement of paragraph text relative to the left and right document margins is called paragraph:

A) Orientation B) Margins C) Alignment

Computer Science & Information Technology

Adding programs to the Quick Launch toolbar creates a shortcut to the program

Indicate whether the statement is true or false

Computer Science & Information Technology