Which of the following should be configured?

An administrator, Ann, wants to ensure that only authorized devices are connected to a switch. She decides to
control access based on MAC addresses. Which of the following should be configured?

An administrator, Ann, wants to ensure that only authorized devices are connected to a switch. She decides to
control access based on MAC addresses. Which of the following should be configured?

A.
Implicit deny

B.
Private VLANS

C.
Flood guard

D.
Switch port security



Leave a Reply 0

Your email address will not be published. Required fields are marked *