When a violation occurs, which of the following violation actions may take effect?

a. Startup.
b. Allow.
c. Protected.
d. All the above are violation actions.


c. Protected
Explanation: Along with the security configuration, you must define a violation action. The violation action protected drops packets from the violated MAC address(es). The violation action restrict is the same as the protected mode, but it also sends SNMP trap messages to the SNMP server. The violation action shutdown is to shut down the port.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a) Case statements use the keyword Is to determine whether the controlling expression satisfies a condition. b) Multiple values can be tested in a Case statement where the values are separated by commas. c) Multiple values in a range can be tested using the To keyword. d) None of the above

Computer Science & Information Technology

You can create a new folder in which to save a file by clicking the New folder button in the Save As ____________________. Type a name for the new folder, and then press the Enter key.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Instant messaging can pose a significant security risk

Indicate whether the statement is true or false.

Computer Science & Information Technology

Putting ____________________ in front of a logical expression reverses the value of that logical expression.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology