What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closer? (Choose two.)
enable the PortFast feature on ports
implement port-based authentication
configure static ARP entries
configure ports to a fixed speed
shut down unused ports
Submit