In this scenario, w...
 
Notifications
Clear all

In this scenario, what must you do to implement the security policy?

1 Posts
1 Users
0 Likes
369 Views
(@pacapacmorgan)
Noble Member
Joined: 2 years ago
Posts: 738
Topic starter  

Click the Exhibit button.

A recent security audit indicates that peer-to-peer applications are allowed on the guest VLAN and employees may have been using the guest VLAN for this purpose. You deploy the configuration shown in the exhibit, but it does not stop the peer-to-peer traffic.

In this scenario, what must you do to implement the security policy?

  • A . Implement 802.1X on the guest VLAN
  • B . Attach the filter to the VLAN
  • C . Deploy storm control to block unknown unicast traffic
  • D . Use persistent MAC learning

Show Answer Hide Answer

Suggested Answer: B

   
Quote
Topic Tags

Latest Juniper JN0-349 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: