which three configuration steps should be performed on the switch to prevent this?

A company has placed a networked PC in a lobby so guests can have access to the corporate
directory.
A security concern is that someone will disconnect the directory PC and re-connect their laptop
computer and have access to the corporate network. For the port servicing the lobby, which
three configuration steps should be performed on the switch to prevent this? (Choose three.)

A company has placed a networked PC in a lobby so guests can have access to the corporate
directory.
A security concern is that someone will disconnect the directory PC and re-connect their laptop
computer and have access to the corporate network. For the port servicing the lobby, which
three configuration steps should be performed on the switch to prevent this? (Choose three.)

A.
Enable port security.

B.
Create the port as a trunk port.

C.
Create the port as an access port.

D.
Create the port as a protected port.

E.
Set the port security aging time to 0.

F.
Statically assign the MAC address to the address table.

G.
Configure the switch to discover new MAC addresses after a set time of inactivity.

Explanation:
If port security is enabled and the port is only designated as access port, and finally static MAC
address is assigned, it ensures that even if a physical connection is done by taking out the
directory PC and inserting personal laptop or device, the connection cannot be made to the
corporate network, hence ensuring safety.



Leave a Reply 0

Your email address will not be published. Required fields are marked *