Which interface or interfaces on switch SW_A can have the port security feature enabled?
A.
Ports 0/1 and 0/2
B.
The trunk port 0/22 and the EtherChannel ports
C.
Ports 0/1, 0/2 and 0/3
D.
Ports 0/1, 0/2, 0/3, the trunk port 0/22 and the EtherChannel ports
E.
Port 0/1
F.
Ports 0/1, 0/2, 0/3 and the trunk port 0/22
Explanation:
Port security is a feature supported on Cisco Catalyst switches that restricts a switch port to
a specific set or number of MAC addresses. Those addresses can be learned dynamically or
configured statically. The port will then provide access to frames from only those addresses.
If, however, the number of addresses is limited to four but no specific MAC addresses are
configured, the port will allow any four MAC addresses to be learned dynamically, and port
access will be limited to those four dynamically learned addresses. A port security feature
called “sticky learning, ” available on some switch platforms, combines the features of
dynamically learned and statically configured addresses. When this feature is configured on
an interface, the interface converts dynamically learned addresses to “sticky secure”
addresses. This adds them to the running configuration as if they were configured using the
switchport port-security mac-address command.
port-security doesnt support Po but does support trunk: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/port_sec.html#wp1038546