An administrator, Ann, wants to ensure that only authorized devices are connected to a switch. She decides to control access based on MAC addresses. Which of the following should be configured?

A. Implicit deny
B. Private VLANS
C. Flood guard
D. Switch port security


Answer: D. Switch port security

Computer Science & Information Technology

You might also like to view...

Which of the following is an illegal use of function put?

a. cout.put("A'); b. cout.put("A");. c. cout.put("A').put("\n&'); d. cout.put(65);

Computer Science & Information Technology

Which of the following changes will Excel NOT track?

A) Functions B) Formatting C) Formulas D) Deletion

Computer Science & Information Technology

A section of code that is repeated is referred to as a ____.

A. condition B. selection C. repetition D. loop

Computer Science & Information Technology

Briefly explain how to perform a risk assessment.

What will be an ideal response?

Computer Science & Information Technology