Free CompTIA Network+ N10-008 Practice Question

An attacker has penetrated a network using a technique that exploits misconfigurations to bypass access control lists segregating traffic. Which of the following measures would be MOST effective in preventing this type of network breach?

  • Configure switch ports to disallow automatic establishment of trunk links.

  • Switch off Spanning Tree Protocol across the network to simplify the topology.

  • Apply Voice VLAN features on all user-facing ports without other restrictive measures.

  • Permit automatic trunk link negotiation on all switch ports to maintain VLAN communication.

This question's topic:
CompTIA Network+ N10-008 / 
Network Security
Your Score:

Check or uncheck an objective to set which questions you will receive.