Which of the following actions will be taken when a port security violation takes place with the protect option enabled?
A) Offending traffic is discarded.
B) Log and SNMP messages are sent.
C) The violation counter is incremented.
D) The interface is disabled.
A
Explanation: A) In protect mode for port security, traffic is discarded, but no other action is taken.
You might also like to view...
If all client processes are single-threaded, is mutual exclusion condition ME3, which specifies entry in happened-before order, relevant?
What will be an ideal response?
A ________ is a type of Sub procedure that is only accessible by other procedures in the module in which it is located
A) Private Sub B) Subcommand C) Subcode D) Submodule
Two or more submacros that are similar in function and are stored under the same macro name is a(n) ________
Fill in the blank(s) with correct word
A reflected attack uses responses from ____.
A. bots to flood a victim B. legitimate services to flood a victim C. handlers to flood a victim D. spoofed IPs to flood a victim