Answer:
Port security and violation mode.
Explanation:
A switch is a layer two device of the OSI model. It is used to transmit frames between nodes within a network. It transfers frames by discovering the destination Mac address and saving it to its address table, and sending the frame to the egest port to the destination.
The port security command is used to specify the Mac addresses that are recognised by a port. There are three types of port security, they are, dynamic, static and sticky Mac addresses that can configured on an interface.
The security violation command is used to decide what happens to a port when it detects an unfamiliar Mac address. The three security violation modes are protect, restrict and shutdown. It is used as an interface command alongside the port security command.
Answer:
A and C are the only <u>legal</u> but unethical options
Answer: Cell site / Base station
Explanation:
A mobile network also referred to as the cellular network is refered to as the radio network which is distributed over the land areas which are refered to as the cells.
We should note that each is served by at least one fixed-location transceiver, which is called the cell site or the base station.
Answer:
Step 1: Obtain a description of the problem. This step is much more difficult than it appears. ...
Step 2: Analyze the problem. ...
Step 3: Develop a high-level algorithm. ...
Step 4: Refine the algorithm by adding more detail. ...
Step 5: Review the algorithm.
Explanation: