Problem
1. Implement port security to mitigate MAC address table attacks.
2. Explain how to configure DTP and native VLAN to mitigate VLAN attacks.
3. Explain how to configure DHCP snooping to mitigate DHCP attacks.
4. Explain how to configure ARP inspection to mitigate ARP attacks.
5. Explain how to configure PortFast and BPDU Guard to mitigate STP attacks.
6. Explain how an IPv6 host can acquire its IPv6 configuration.
7. Explain the operation of SLAAC.
8. Explain the operation of DHCPv6.
9. Configure a stateful and stateless DHCPv6 server.
10. Explain the purpose and operation of first hop redundancy protocols.
11. Explain how HSRP operates.