The information security policy of your organization requires that ports should remain
administratively Up. Which selection represents the best practice for an 802.1X-enabled
port that is configured to allow only one host to authenticate on the port?
A.
The 3k-access(config-if)# authentication violation shutdown command can be used to
prevent a second MAC address from authenticating on the port.
B.
The 3k-access(config-if)# authentication violation restrict command can be used to
prevent any MAC address from authenticating on the port.
C.
The 3k-access(config-if)# authentication violation ignore command can be used to
prevent any MAC address from authenticating on the port.
D.
The 3k-access(config-if)# authentication violation shutdown command can be used to
prevent a second MAC address from authenticating on the port.