Which of the following actions will be taken when a port security violation takes place with the protect option enabled?

A) Offending traffic is discarded.
B) Log and SNMP messages are sent.
C) The violation counter is incremented.
D) The interface is disabled.

A
Explanation: A) In protect mode for port security, traffic is discarded, but no other action is taken.

Computer Science & Information Technology

You might also like to view...

When creating a form for users who may not have Word 2013, you should use legacy form controls instead of content controls

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ attribute identifies a specific section of a Web page

Fill in the blank(s) with correct word

Computer Science & Information Technology