Matt

30%
Flag icon
The following bullets identify some use cases that you can implement with switches: •   Prevent switching loops. You do this by implementing STP or RSTP on switches. •   Block flood attacks. Flood guards block MAC flood attacks. •   Prevent unauthorized users from connecting to unused ports. Port security methods, such as disabling unused ports, prevent these unauthorized connections. •   Provide increased segmentation of user computers. VLANs provide increased segmentation. They are implemented on Layer 3 switches.
CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate this book
Clear rating
Open Preview