CCNA Cisco Certified Network Associate (#263)

Section: Version 3.0

According to security best practices, which two actions must you take to protect an unused switch port? (Choose two.)

Administratively shut down the port.
Configure the port as a trunk port.
Configure the port to automatically come online.
Enable CDP.
Configure the port as an access port on a VLAN other than VLAN 1.