1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
4 years ago
8

A network administrator is configuring port security on a cisco switch. the company security policy specifies that when a violat

ion occurs, packets with unknown source addresses should be dropped and no notification should be sent. which violation mode should be configured on the interfaces? off
Computers and Technology
1 answer:
DIA [1.3K]4 years ago
6 0
<span>There are three different main violation types: shutdown, protect, and restrict.
1. </span><span>Shutdown violation mode:When a violation occurs, the </span>switchport will be taken out of service and placed in the disabled state. This is the default switchport security violation mode. 
2. <span>Protect violation mode: When a violation occurs in this mode, the switchport will permit traffic from known MAC addresses to continue sending traffic while dropping traffic from unknown MAC addresses. 
3. </span><span>Restrict violation mode: When a violation occurs in this mode, the switchport will permit traffic from known MAC addresses to continue sending traffic while dropping traffic from unknown MAC addresses. 
In our case there are two possibilities: the network administrator can configure both protect violation mode and restrict violation mode, because both modes drop packets from unknown source addresses when a violation occurs.</span>
You might be interested in
There used to be a popular type of pulp book for younger readers. They were called "Choose Your Own Adventure" novels. The idea
Vlad [161]

Answer:

click on the link

Explanation:

link is somewhere hidden

3 0
3 years ago
Why do we use modem while<br>accessing the internet or email​
Dafna1 [17]

Answer: Modems: Your gateway to the internet

To bring the internet into your home, you're going to need a modem. This is a small device that connects to your internet service provider (ISP) to tap into all that internet goodness. ... Your modem shares this connection with a computer or a router via an Ethernet cable.

Explanation:

7 0
4 years ago
In a brief essay explain the security vulnerabilities of transition methods (6to4, etc.)
vlabodo [156]

Answer:

While transiting from IPv4  to IPv6, many offices and companies use both the protocols (Ipv4 and IPv6) at the same time. This scenario can increase the risk  rate of attack twice. All the flaws and vulnerabilities could be overlooked easily when transition is done.

On the other hand, while transiting Ipv6 to IPv4, the router does not tells or depicts that the communication is appropriate or if it could be used as a part of DoS attack that make it so much harder to trace the origin back.

The reason for the vulnerability of Transport Relay Translators (TRT) is that they do not apply Internet Protocol Security (IPSec) and thats why they are not secure.

i hope it will help you!

7 0
4 years ago
How do you understand a scientific problem? Give two (2) examples of a scientific problem you
Brums [2.3K]

Answer:

i need free points im sry

Explanation:

8 0
3 years ago
_________values are stored as the number of seconds since the unix epoch (35 POINTS)
Nataly_w [17]

Answer:

he Unix epoch (or Unix time or POSIX time or Unix timestamp) is the number of seconds that have elapsed since January 1, 1970 (midnight UTC/GMT), not counting leap seconds (in ISO 8601: 1970-01-01T00:00:00Z).

Explanation:

The answer above is from a secure website

3 0
3 years ago
Other questions:
  • In the 1950s, the three major networks (ABC, NBC, and CBS) developed prime-time shows that would appeal to a general family audi
    11·1 answer
  • What are the three most important jobs of an operating system?
    8·1 answer
  • The part you should check first when you are servicing a sparking universal motor is the A. commutator. B. armature. C. brushes.
    9·1 answer
  • What is the primary limitation of free versions of antivirus applications
    14·1 answer
  • Which of the following statements about websites is NOT true?
    8·2 answers
  • Which of the following technologies allows you to decouple the physical storage hardware from the storage requirements of the ap
    6·1 answer
  • ____ is a website that checks a submitted paper and then determines how much of the paper is unoriginal.
    12·1 answer
  • Many PC operating systems provide functionality that enables them to support the simultaneous execution of multiple applications
    13·1 answer
  • Question 8 of 10
    12·1 answer
  • The SQL SELECT built-in function COUNT ____.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!