When defining the network security policy, what security exceptions are you allowed to set, and what do they do?

What will be an ideal response?


The network security policy allows the administrator to set the following security exceptions:
* Promiscuous Mode-When set to Reject, placing a guest adapter in promiscuous mode has no effect on which frames are received by the adapter (default is Reject).
* MAC Address Changes-When set to Reject, if the guest attempts to change the MAC address assigned to the virtual NIC, it stops receiving frames (default is Accept).
* Forged Transmits-When set to Reject, the virtual NIC drops frames that the guest sends, where the source address field contains a MAC address other than the assigned virtual NIC MAC address (default is Accept).

Computer Science & Information Technology

You might also like to view...

What query would you use to find items that have never sold?

A) Find Null B) Find duplicates C) Crosstab D) Find unmatched

Computer Science & Information Technology

In declaring and initializing a string variable for use in an open() method, the string is considered a ____.

a. string object b. C-string c. c_str d. c-character

Computer Science & Information Technology

Each of the following is a rule for defining names EXCEPT: ________

A) A defined name can be no longer than 255 characters. B) The letters C or R cannot be defined as a name. C) The first character of a name must be a letter, underscore, or backslash. D) Defined names can contain spaces.

Computer Science & Information Technology

Sheet tab grouping can be canceled by ________

A) clicking the word Group on the title bar B) right-clicking the word Group on the title bar and selecting Ungroup C) single-clicking on any worksheet tab D) right-clicking on the tab scrolling buttons and selecting Ungroup

Computer Science & Information Technology