Which interface or interfaces on switch SW_A can have the port security feature enabled?

Refer to the exhibit. Which interface or interfaces on switch SW_A can have the port security feature enabled?

Refer to the exhibit. Which interface or interfaces on switch SW_A can have the port security feature enabled?

A.
Ports 0/1 and 0/2

B.
The trunk port 0/22 and the EtherChannel ports

C.
Ports 0/1, 0/2 and 0/3

D.
Ports 0/1, 0/2, 0/3, the trunk port 0/22 and the EtherChannel ports

E.
Port 0/1

F.
Ports 0/1, 0/2, 0/3 and the trunk port 0/22

Explanation:

Port security is a feature supported on Cisco Catalyst switches that restricts a switch port to a specific set or number of MAC addresses. Those addresses can be learned dynamically or configured statically. The port will then provide access to frames from only those addresses. If, however, the number of addresses is limited to four but no specific MAC addresses are configured, the port will allow any four MAC addresses to be learned dynamically, and port access will be limited to those four dynamically learned addresses. A port security feature called “sticky learning,” available on some switch platforms, combines the features of dynamically learned and statically configured addresses. When this feature is configured on an interface, the interface converts dynamically learned addresses to “sticky secure” addresses. This adds them to the running configuration as if they were configured using the switchport port-security mac-address command.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


KenB

KenB

The answer is F. port security can be enabled on nonegotiating trunks.