A security policy has been applied to an individual port on a virtual switch. The switch itself has a conflicting policy configured. What setting has priority?

A. The settings at the virtual switch level will have priority, as the policy is inherited by the port.
B. The settings on the port will have priority, because the policy is overridden at the port level.
C. The overall setting will be disabled until the conflicting settings are manually changed.
D. The more restrictive setting will be used automatically.


Answer: B

Computer Science & Information Technology

You might also like to view...

A ____ is a high-capacity communications medium that joins networks and central network devices across long distances.

A. router B. backbone C. hub D. switch

Computer Science & Information Technology

Let X , Y , S, R be sets of attributes such that S ? R and X ? Y = R. Let r be a relation over R that satis?es the nontrivial MVD R = X  Y (i.e., neither set X or Y is a subset of the other).

a. Prove that if X ? Y ? S , then the relation ?S(r) satis?es the MVD S =(S ? X) (S ? Y ). b. Suppose X , Y , S ,andR satisfy all the above conditions, except that X ? Y ? S. Give an example of r that satis?es R = X  Y but does not satisfy S =(S ? X ) (S ? Y ).

Computer Science & Information Technology

Which of the following types of variables is supported by Ruby?

A. Local B. Global C. Instance D. All of the above

Computer Science & Information Technology

The Unlock All command is under which menu on the Menu bar?

A. Edit B. Object C. Select D. Window

Computer Science & Information Technology