When a violation occurs, which of the following violation actions may take effect?
a. Startup.
b. Allow.
c. Protected.
d. All the above are violation actions.
c. Protected
Explanation: Along with the security configuration, you must define a violation action. The violation action protected drops packets from the violated MAC address(es). The violation action restrict is the same as the protected mode, but it also sends SNMP trap messages to the SNMP server. The violation action shutdown is to shut down the port.
You might also like to view...
Which of the following statements is false?
a) Case statements use the keyword Is to determine whether the controlling expression satisfies a condition. b) Multiple values can be tested in a Case statement where the values are separated by commas. c) Multiple values in a range can be tested using the To keyword. d) None of the above
You can create a new folder in which to save a file by clicking the New folder button in the Save As ____________________. Type a name for the new folder, and then press the Enter key.
Fill in the blank(s) with the appropriate word(s).
Instant messaging can pose a significant security risk
Indicate whether the statement is true or false.
Putting ____________________ in front of a logical expression reverses the value of that logical expression.
Fill in the blank(s) with the appropriate word(s).