The conference room has a switch port available for use by the presenter during classes. Each presenter uses the same PC attached to the port. You would like to
prevent any other PCs from using that port. You have completely removed the former configuration in order to start anew.
Which of the following steps are required to prevent any other PCs from using that port?
A.
make the port a trunk port
B.
enable port security
C.
make the port an access port
D.
assign the MAC address of the PC to the port
E.
make the port a sticky port
F.
set the maximum number of MAC addresses on the port to 1
Explanation:
You should create the port as an access port, enable port security, and statically assign the MAC address of the PC to the port. Creating the port as an access port
ensures that the PC can use the port and port security can be enabled on the port. The second step is to enable port security, which is required to use the third
command. The third command sets the MAC address of the PC as the statically assigned address on that port, meaning that only that address can send and
receive on the port.
You should not make the port a trunk port. There is no need to make this a trunk port because it will not be carrying multiple VLAN traffic, only the traffic of the PC.
You should not make the port a sticky port. The sticky keyword, when used with switchport port-security command, is used to allow a port to dynamically learn the
first MAC address it sees in the port, add it to the MAC address table, and save it to the running configuration of the switch. It will not limit the MAC addresses
allowed on the port to that of the PC.
You should not set the maximum number of MAC addresses on the port to 1. That would prevent the attachment of a hub or switch to the port, but would not restrict
the MAC addresses allowed on the port to the MAC address of the PC.
Objective:
Infrastructure Security
Sub-Objective:
Configure, verify, and troubleshoot port securityCatalyst 4500 Series Switch Cisco IOS Software Configuration Guide, 12.2(20)EWA > Configuring Port Security