Explain why in modern networks the native VLAN is set to an unused VLAN and the trunk port is configured to tag its native VLAN traffic as well.
What will be an ideal response?
Native VLANs exist to provide compatibility with older or simpler non-VLAN tagging switches, but there is a catch. The native VLAN opens your network to a nasty vulnerability called a double-tagging attack that lets the attacker access VLANs they should not be able to access. For this reason, in modern networks the native VLAN is set to an unused VLAN and the trunk port is configured to tag its native VLAN traffic as well.
You might also like to view...
MC Bytes are composed of__________ bits.
a) Ten. b) Six. c) Eight. d) Two.
boolean values can be displayed as the words true and false with the ________ format specifier.
a. %bool. b. %b. c. %true. d. %boolean.
Given a base class named Vehicles and a derived class named Sedans, __________ can inherit from __________.
a. Sedans can inherit from Vehicles b. Vehicles can inherit from Sedans c. Inheritance is not possible here because there is no superclass. d. Inheritance is not possible here because there is no subclass.
A sequence of folders in the folder structure that leads to a specific file or folder is a(n) ________
Fill in the blank(s) with correct word