hardmultiple choiceObjective-mapped

A company wants unauthorized devices plugged into unused wall ports to have as little chance of gaining access as possible. Which action most directly supports that goal?

Question 1hardmultiple choice
Full question →

A company wants unauthorized devices plugged into unused wall ports to have as little chance of gaining access as possible. Which action most directly supports that goal?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Administratively disable unused switch ports.

This is correct because unused active ports are unnecessary exposure points.

B

Distractor review

Convert every unused port into a trunk.

This is wrong because trunking unused ports increases exposure and complexity.

C

Distractor review

Enable Telnet on unused ports for monitoring.

This is wrong because Telnet is insecure and unrelated to this hardening goal.

D

Distractor review

Remove all VLAN assignments from active user ports.

This is wrong because the question is about unused-port exposure, not breaking active production access.

Common exam trap

Common exam trap: answer the scenario, not the keyword

A frequent exam trap is assuming that assigning unused ports to an unused VLAN or enabling monitoring protocols like Telnet on those ports provides sufficient security. Candidates may mistakenly believe that VLAN segmentation alone prevents unauthorized access, but VLAN hopping attacks or misconfigurations can bypass this. Similarly, enabling Telnet on unused ports is irrelevant and insecure, as Telnet is a plaintext protocol and does not restrict physical access. The trap is to overlook the fundamental step of administratively disabling unused ports, which completely cuts off any unauthorized device from network access at Layer 2.

Technical deep dive

How to think about this question

Unused switch ports represent a significant security risk because they provide potential entry points for unauthorized devices. In Cisco networking, each switch port can be administratively enabled or disabled. When a port is administratively disabled (shutdown), it stops forwarding any traffic and does not participate in VLAN or spanning-tree operations. This effectively removes the port from the network, preventing any device connected to it from gaining access or causing network disruptions. The best practice to secure unused ports is to administratively disable them. This action is a proactive security measure that reduces the attack surface by eliminating unnecessary active ports. Unlike relying on monitoring or VLAN segmentation alone, disabling ports ensures that no traffic can pass through, which is a fundamental step in port security. Cisco switches allow network administrators to quickly disable ports via the CLI using the "shutdown" command under the interface configuration mode. A common exam trap is confusing port security features like port-based authentication or VLAN assignments with the fundamental step of disabling unused ports. While features like 802.1X or VLAN segmentation add layers of security, they do not replace the need to shut down unused ports. Practically, leaving unused ports enabled—even if assigned to an unused VLAN—still risks unauthorized access if VLAN hopping or misconfigurations occur. Disabling ports is the simplest and most effective baseline security control in Cisco environments.

KKey Concepts to Remember

  • Administratively disabling unused switch ports prevents any Layer 2 traffic from passing through, effectively removing the port from the network.
  • Unused active switch ports create unnecessary exposure points that attackers can exploit to gain unauthorized network access.
  • Assigning unused ports to unused VLANs does not guarantee security because VLAN hopping or misconfigurations can allow access.
  • Enabling insecure protocols like Telnet on unused ports increases security risks and does not prevent unauthorized physical connections.
  • Cisco switches use the "shutdown" command in interface configuration mode to administratively disable ports.
  • Disabling unused ports reduces the attack surface by eliminating potential entry points rather than relying on monitoring or detection.
  • Port security features complement but do not replace the fundamental security measure of disabling unused ports.
  • Effective network hardening starts with eliminating unnecessary active ports to prevent casual or opportunistic unauthorized access.

TExam Day Tips

  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related 200-301 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this 200-301 question test?

Administratively disabling unused switch ports prevents any Layer 2 traffic from passing through, effectively removing the port from the network.

What is the correct answer to this question?

The correct answer is: Administratively disable unused switch ports. — Administratively shutting down unused switch ports most directly supports that goal. In practical terms, if the business has no reason to keep a port active, leaving it enabled creates an unnecessary access point. Disabling it reduces attack surface and makes casual or opportunistic unauthorized connection attempts much harder. This is a simple hardening measure, but it is one of the most effective because it removes exposure entirely instead of trying to monitor a risk that does not need to exist.

What should I do if I get this 200-301 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.