200-301 · Question #413
200-301 Question #413: Real Exam Question with Answer & Explanation
The correct answer is D: configure it as a different VLAN ID on each end of the link. To secure the native VLAN, it should be configured as a different, unused VLAN ID on each end of the trunk link, and preferably not VLAN 1, which is the default native VLAN on many switches. This prevents double-tagging attacks and isolates untagged traffic.
Question
How is the native VLAN secured in a network?
Options
- Aseparate from other VLANs within the administrative domain
- Bgive it a value in the private VLAN range
- Cassign it as VLAN 1
- Dconfigure it as a different VLAN ID on each end of the link
Explanation
To secure the native VLAN, it should be configured as a different, unused VLAN ID on each end of the trunk link, and preferably not VLAN 1, which is the default native VLAN on many switches. This prevents double-tagging attacks and isolates untagged traffic.
Common mistakes.
- A. While separating it is good, merely being separate doesn't define the specific security mechanism for the native VLAN itself.
- B. Giving it a value in the private VLAN range relates to Private VLAN (PVLAN) technology, which is a different security feature, not the primary method for securing the native VLAN.
- C. Assigning it as VLAN 1 is the default and often insecure configuration, as VLAN 1 is a well-known VLAN that attackers frequently target.
Concept tested. Native VLAN security best practices
Topics
Community Discussion
No community discussion yet for this question.