When a violation occurs, which of the following violation actions may take effect?

a. Startup.
b. Allow.
c. Protected.
d. All the above are violation actions.

c. Protected
Explanation: Along with the security configuration, you must define a violation action. The violation action protected drops packets from the violated MAC address(es). The violation action restrict is the same as the protected mode, but it also sends SNMP trap messages to the SNMP server. The violation action shutdown is to shut down the port.

Computer Science & Information Technology

You might also like to view...

Increasing the line spacing for speaker notes makes them easier to read, navigate, and annotate

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following choices is one of the 12 specific views recommended by the IEEE 1016 standard that describes the way software is recursively structured into fundamental parts?

A. Context B. Composition C. Logical D. Dependency

Computer Science & Information Technology