The Ajax network coordinator is concerned that the IP phones can be targeted for malicious attack. When the security is designed for the IP telephony solution, which two methods can be used to help prevent malicious phone attacks? (Choose two.)
Ensure the PC port is disabled if a PC is not attached.
isolate the IP phone VLANs from the PC data VLANs.
Ensure the IP phone firmware is validated with the Cisco Unified Communications Manager.
Ensure the Cisco Unified Communications Manager is configured to disable acceptance of GARP on IP phones.
Want to practice for 642-415 - UCAD - Unified Communications Architecture and Design Exam ?