Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?
- Configure all unused ports to a ‘black-hole’ VLAN that is not used for anything on the network.
- Disable autonegotiation and set ports to either static access or static trunk.
- Change the native VLAN to a fixed VLAN that is distinct from all user VLANs and to a VLAN number that is not VLAN 1.
- All user ports are associated with VLANs distinct from VLAN 1 and distinct from the ‘black-hole’ VLAN.