An administrator, Ann, wants to ensure that only authorized devices are connected to a switch. She decides to control access based on MAC addresses. Which of the following should be configured?
A. Implicit deny
B. Private VLANS
C. Flood guard
D. Switch port security
Answer: D. Switch port security
Computer Science & Information Technology
You might also like to view...
Which of the following is an illegal use of function put?
a. cout.put("A'); b. cout.put("A");. c. cout.put("A').put("\n&'); d. cout.put(65);
Computer Science & Information Technology
Which of the following changes will Excel NOT track?
A) Functions B) Formatting C) Formulas D) Deletion
Computer Science & Information Technology
A section of code that is repeated is referred to as a ____.
A. condition B. selection C. repetition D. loop
Computer Science & Information Technology
Briefly explain how to perform a risk assessment.
What will be an ideal response?
Computer Science & Information Technology