1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
4 years ago
8

A network administrator is configuring port security on a cisco switch. the company security policy specifies that when a violat

ion occurs, packets with unknown source addresses should be dropped and no notification should be sent. which violation mode should be configured on the interfaces? off
Computers and Technology
1 answer:
DIA [1.3K]4 years ago
6 0
<span>There are three different main violation types: shutdown, protect, and restrict.
1. </span><span>Shutdown violation mode:When a violation occurs, the </span>switchport will be taken out of service and placed in the disabled state. This is the default switchport security violation mode. 
2. <span>Protect violation mode: When a violation occurs in this mode, the switchport will permit traffic from known MAC addresses to continue sending traffic while dropping traffic from unknown MAC addresses. 
3. </span><span>Restrict violation mode: When a violation occurs in this mode, the switchport will permit traffic from known MAC addresses to continue sending traffic while dropping traffic from unknown MAC addresses. 
In our case there are two possibilities: the network administrator can configure both protect violation mode and restrict violation mode, because both modes drop packets from unknown source addresses when a violation occurs.</span>
You might be interested in
What is one of the benefits of using a library in a program?
Phoenix [80]

Answer:

Simplifies creating a complex program

Explanation:

7 0
3 years ago
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network
polet [3.4K]
It is a personal network of Sean’s friends family’s
5 0
3 years ago
Scrie un program care citind varstele a 2 copii afiseaza care dintre ei este cel mai mare si cu cat. Exemplu: Pentru varstele 5
murzikaleks [220]

Answer:

primul_copil = int(input("Introduceți vârsta primului copil: "))

aldoilea_copil = int(input("Introduceți vârsta celui de-al doilea copil: "))

def copilmai_mare(varsta1, varsta2):

   if varsta1 > varsta2:

       diferenta = varsta1 - varsta2

       print("copilul mai mare este varsta1 cu diferența de vârstă de: ", diferenta )

   else:

       diferenta = varsta2 - varsta1

       print("copilul mai mare este varsta2 cu diferența de vârstă de: ", diferenta )

copilmai_mare(primul_copil, aldoilea_copil)

Explanation:

Programul python de mai sus definește o funcție "copilmai_mare" care ia două argumente "varsta1" și "varsta2". Diferența dintre vârstele copiilor este comparată, iar cel mai mare copil și diferența sunt tipărite pe ecran.

5 0
3 years ago
Why was the movable type of the printing press such a breakthrough for publishing?
guapka [62]
Movable type is not part of a printing press. Before movable type and printing presses, things had to be manually transcribed (copied by hand), which was  extremely expensive. The press mechanized copying, lowering it's cost and driving down the cost of reproduction.

Arguably, there wasn't any publishing before movable type and printing presses.
3 0
3 years ago
Read 2 more answers
One condition for deadlocks is the circular-wait condition. One way to ensure that this condition never holds is to impose a tot
Artyom0805 [142]
<h2>Dead lock is possible in Bank Transactions</h2>

Explanation:

Let us understand the term "Dead lock"

A deadlock is a situation where whole set of process is locked, since each of the process is waiting or holding the resource of another process. Each process will be interdependent and waiting for the same resource.

Deadlock is possible during bank transaction in the following situation:

A & B are two accounts where A tries to transfer funds to B and B tries to transfer fund to A.

When both tries to transfer funds at the same time, deadlock occurs.

A deadlock can be avoided by any one of the four methods.

They are: Mutual exclusion, No preemption, circular wait, hold and wait.

4 0
4 years ago
Read 2 more answers
Other questions:
  • Which dialog box opens after selecting a cell in the list of prepared data, clicking the insert tab on ribbon and the clicking t
    6·1 answer
  • __________________ are evaluations of a network
    6·1 answer
  • Select the correct answer. One of the functions of a data warehouse is to change table names to meaningful names. Which name is
    13·1 answer
  • Write a function that creates a one-dimensional game board composed of agents of two different types (0 and 1, X and O, stars an
    11·1 answer
  • How do assembly language different from machine language?
    15·1 answer
  • Which of the following activities does an effective team do?
    15·2 answers
  • What technique is used when setup times at a workstation are sequence dependent?
    15·1 answer
  • What are the two extra registers that the fetch decode execute cycle uses to communicate with memory outside of the chip?
    9·1 answer
  • True/false questions are useful in determining a student’s ability to____information
    8·1 answer
  • All of the following are personal security safeguards except ________. Select one: A. send no valuable data via email B. Use htt
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!