When a violation occurs, which of the following violation actions may take effect?
a. Startup.
b. Allow.
c. Protected.
d. All the above are violation actions.
c. Protected
Explanation: Along with the security configuration, you must define a violation action. The violation action protected drops packets from the violated MAC address(es). The violation action restrict is the same as the protected mode, but it also sends SNMP trap messages to the SNMP server. The violation action shutdown is to shut down the port.
You might also like to view...
Increasing the line spacing for speaker notes makes them easier to read, navigate, and annotate
Indicate whether the statement is true or false
Which of the following choices is one of the 12 specific views recommended by the IEEE 1016 standard that describes the way software is recursively structured into fundamental parts?
A. Context B. Composition C. Logical D. Dependency