Which of the following actions will be taken when a port security violation takes place with the protect option enabled?
A) Offending traffic is discarded.
B) Log and SNMP messages are sent.
C) The violation counter is incremented.
D) The interface is disabled.
A
Explanation: A) In protect mode for port security, traffic is discarded, but no other action is taken.
Computer Science & Information Technology
You might also like to view...
When creating a form for users who may not have Word 2013, you should use legacy form controls instead of content controls
Indicate whether the statement is true or false
Computer Science & Information Technology
The ________ attribute identifies a specific section of a Web page
Fill in the blank(s) with correct word
Computer Science & Information Technology