You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use?
a. set max-mac
b. set total-macs
c. mac-address limit
d. mac-limit
ANSWER: d
Computer Science & Information Technology
You might also like to view...
________ is the likelihood that a threat will exploit a vulnerability resulting in a loss
Fill in the blank(s) with correct word
Computer Science & Information Technology
What are the relative advantages of one?address, two?address, and three?address computer architectures?
What will be an ideal response?
Computer Science & Information Technology
Which of the following technologies is an example of third generation sequencing?
Computer Science & Information Technology
Which of the following layers is the presentation layer?
a) Layer 3 b) Layer 5 c) Layer 6 d) Layer 7
Computer Science & Information Technology