Which technology enables a switch to control the number of MAC addresses that are allowed to send traffic through to a specific port?

A) MAC Security
B) Layer 2 discard mode
C) CBAC
D) DTP
E) Port Security


E
Explanation: E) The Port Security feature offers the capability to secure a switch from several different threat types, including the capability to limit which MAC addresses can access the switch from specific switchports.

Computer Science & Information Technology

You might also like to view...

What value is returned by function result?

``` double result( const double list[], int ListSize ) { double x; x = list[0]; for (int i = 1; i < ListSize; ++i) if ( list[i] < x ) x = list[i]; return x; } ``` a. the smallest of the first ListSize elements of array list b. the subscript of the first occurrence of the smallest of the first ListSize elements of array list c. the largest of the first ListSize elements of array list d. the subscript of the first occurrence of the largest of the first ListSize elements of array list

Computer Science & Information Technology

Robin has purchased a new computer that has the Windows 10 operating system. Excited about learning the new features of Windows 10, she starts the computer, enters her login information and takes a look at the desktop. She displays the Start menu and takes time to get acquainted with her new working environment. Robin notices that the on the right side of the status bar, there is a(n) __________ area containing the date and time as well as icons that tell her the status of her computer.

What will be an ideal response?

Computer Science & Information Technology

The ?tcpdump and Wireshark utilities both use what well known packet capture format?

A. ?Netcap B. ?Pcap C. ?Packetd D. ?RAW

Computer Science & Information Technology

Compare and contrast direct-mapped, set-associative and fully associative cache designs.

What will be an ideal response?

Computer Science & Information Technology