Which of the following steps are required to prevent an…

The conference room has a switch port available for use by the presenter during classes. Each presenter uses
the same PC attached to the port. You would like to prevent any other PCs from using that port. You have
completely removed the former configuration in order to start anew.
Which of the following steps are required to prevent any other PCs from using that port?

The conference room has a switch port available for use by the presenter during classes. Each presenter uses
the same PC attached to the port. You would like to prevent any other PCs from using that port. You have
completely removed the former configuration in order to start anew.
Which of the following steps are required to prevent any other PCs from using that port?

A.
make the port a trunk port

B.
enable port security

C.
make the port an access port

D.
assign the MAC address of the PC to the port

E.
make the port a sticky port

F.
set the maximum number of MAC addresses on the port to 1

Explanation:
You should create the port as an access port, enable port security, and statically assign the MAC address of the
PC to the port. Creating the port as an access port ensures that the PC can use the port and port security can
be enabled on the port. The second step is to enable port security, which is required to use the third command.
The third command sets the MAC address of the PC as the statically assigned address on that port, meaning
that only that address can send and receive on the port.
You should not make the port a trunk port. There is no need to make this a trunk port because it will not be
carrying multiple VLAN traffic, only the traffic of the PC.
You should not make the port a sticky port. The sticky keyword, when used with switchport port-security
command, is used to allow a port to dynamically learn the first MAC address it sees in the port, add it to the
MAC address table, and save it to the running configuration of the switch. It will not limit the MAC addresses
allowed on the port to that of the PC.
You should not set the maximum number of MAC addresses on the port to 1. That would prevent the
attachment of a hub or switch to the port, but would not restrict the MAC addresses allowed on the port to the
MAC address of the PC.
Objective:
Infrastructure Security
Sub-Objective:Configure, verify, and troubleshoot port security

Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide, 12.2(20)EWA > Configuring Port
Security



Leave a Reply 0

Your email address will not be published. Required fields are marked *