You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use?

a. set max-mac
b. set total-macs
c. mac-address limit
d. mac-limit


ANSWER: d

Computer Science & Information Technology

You might also like to view...

________ is the likelihood that a threat will exploit a vulnerability resulting in a loss

Fill in the blank(s) with correct word

Computer Science & Information Technology

What are the relative advantages of one?address, two?address, and three?address computer architectures?

What will be an ideal response?

Computer Science & Information Technology

Which of the following technologies is an example of third generation sequencing?

Computer Science & Information Technology

Which of the following layers is the presentation layer?

a) Layer 3 b) Layer 5 c) Layer 6 d) Layer 7

Computer Science & Information Technology