For more course tutorials visit
Based on the Beliles and Twinam (2008)
article, what role does an Ethernet layer 2 switch play in virtual local-area
networks (VLAN)? How can an Ethernet layer 2 switch be used to implement
physical and data security policies? How does protecting a VLAN switch in a
secure physical location prevent tampering?