The conference room has a switch port available for use by the presenter during classes. You would like to prevent that port from hosting a hub or switch.
Which of the following commands could be used to prevent that port from hosting a hub or switch?
A.
switchport port-security maximum
B.
switchport port-security mac address sticky
C.
switchport port-security mac address
D.
switchport port-security
Explanation:
The switchport port-security command would prevent the port from hosting a hub or switch. This command enables port security on an interface. It does not specify
a maximum number of MAC addresses, but in the default is 1, therefore it would accomplish the goal.
The switchport port-security maximum command alone could not be used to limit the number of MAC addresses allowed on the interface to 1. This command hasno effect unless the switchport port-security command has been executed.
The switchport port-security mac address sticky command would not prevent that port from hosting a hub or switch. This command is used to allow a port to
dynamically learn the first MAC address it sees in the port, add it to the MAC address table and save it to the running configuration of the switch.
The switchport port-security mac address command would not prevent that port from hosting a hub or switch. This command is used to manually assign a MAC
address to a port as a secure address. When used in combination with the switchport port-security maximum command, the use of the port can not only be limited
to one address at a time, but also limited to only a specific address. For example, the following set of commands would assure that only the device with the MAC
address of 0018.cd33.46b3 will be able to connect to the port:
Switch(config-if)#switchport port-security maximum 1
Switch(config-if)#switchport port-security mac-address 0018.cd33.46b3
Objective:
Infrastructure Security
Sub-Objective:
Configure, verify, and troubleshoot port securityCatalyst 4500 Series Switch Cisco IOS Software Configuration Guide, 12.2(20)EWA>Configuring Port Security