Which of the following actions will be taken when a port security violation takes place with the protect option enabled?

A) Offending traffic is discarded.
B) Log and SNMP messages are sent.
C) The violation counter is incremented.
D) The interface is disabled.


A
Explanation: A) In protect mode for port security, traffic is discarded, but no other action is taken.

Computer Science & Information Technology

You might also like to view...

If all client processes are single-threaded, is mutual exclusion condition ME3, which specifies entry in happened-before order, relevant?

What will be an ideal response?

Computer Science & Information Technology

A ________ is a type of Sub procedure that is only accessible by other procedures in the module in which it is located

A) Private Sub B) Subcommand C) Subcode D) Submodule

Computer Science & Information Technology

Two or more submacros that are similar in function and are stored under the same macro name is a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A reflected attack uses responses from ____.

A. bots to flood a victim B. legitimate services to flood a victim C. handlers to flood a victim D. spoofed IPs to flood a victim

Computer Science & Information Technology