Problem Statement
Which statement about VLANs is accurate in the context of security?
Explanation
VLANs segment at layer two. Security enforcement still needs layer three routing, ACLs, and firewall policy. Do not treat VLAN tags as a full security boundary without controls.
Code Solution
SolutionRead Only
Policy: VLAN10(user) ↔ VLAN30(db) = deny by default; allow only app ports
