Company GHI consolidated their network distribution so twelve network VLANs would be available over dual fiber links to a modular L2 switch in each of the company’s six IDFs. The IDF modular switches have redundant switch fabrics and power supplies.
Which of the following threats will have the GREATEST impact on the network and what is the appropriate remediation step?
A . Threat: 802.1q trunking attack Remediation: Enable only necessary VLANs for each port
B . Threat: Bridge loop Remediation: Enable spanning tree
C . Threat: VLAN hopping Remediation: Enable only necessary VLANs for each port
D . Threat: VLAN hopping Remediation: Enable ACLs on the IDF switch