According to security best practices, which two actions must you take to protect an unused switch port? (Choose two)
A . Enable CDP
B . Configure the port as an access port on a VLAN other than VLAN 1
C . Administratively shut down the port
D . Configure the port as a trunk port
E . Configure the port to automatically come online
Answer: BC
Latest 200-125 Dumps Valid Version with 759 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund