Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Hi guys,

Little confused by the below question:

"Which two components should be part of a security implementation plan?

a. Detailed list of personnel assigned to each task within the plan
b. A Layer 2 spanning tree design topology
c. Enabling SNMP access to CDP data for logging and forensic analysis
d. Rollback guidelines
e. Placing all unused ports in VLAN 1 to proactively manage port security"

I answered A and D but the answer is apparently B and D, so my question is what does spanning tree have to do with implementing security?



Forum Jump:

Users browsing this thread: 1 Guest(s)