1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
3 years ago
11

You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public

kiosk display that allows guests to access the Internet. You would like to implement port security to prevent guests from removing Ethernet cables from the hosts and connecting them to the Ethernet ports on their personal laptops. If guests attempt to connect through their personal laptops, you would like the switch to drop the frames.
Complete the following tasks:

a.Configure FastEthernet 0/2 through 0/4 as access ports.
b.On the FastEthernet 0/2 through 0/4, configure port security to learn and retain the MAC addresses of the connected hosts.
c.Configure the port security violation as protect on each applicable interface.
Save your changes to the startup-config file.
d.The switch is currently configured with the default port security settings. Use the show run command to verify the configurations.
Computers and Technology
1 answer:
irga5000 [103]3 years ago
4 0

Answer:

Port security and violation mode.

Explanation:

A switch is a layer two device of the OSI model. It is used to transmit frames between nodes within a network. It transfers frames by discovering the destination Mac address and saving it to its address table, and sending the frame to the egest port to the destination.

The port security command is used to specify the Mac addresses that are recognised by a port. There are three types of port security, they are, dynamic, static and sticky Mac addresses that can configured on an interface.

The security violation command is used to decide what happens to a port when it detects an unfamiliar Mac address. The three security violation modes are protect, restrict and shutdown. It is used as an interface command alongside the port security command.

You might be interested in
The Nigerian 4-6-9 scam refers to a fraudulent activity whereby individuals claiming to be from a foreign country will promise a
Serhud [2]

Answer:

<em>b. False</em>

<em></em>

Explanation:

<em>The system of fraud is called 4-1-9 scam</em>. And yes, victims are always promised large sum of money to secretly help in moving a large sum of money.

7 0
3 years ago
I found a brand-new charger wire still in its plastic package, but it's six years old and has never been used. Is it safe to use
Oduvanchick [21]

Answer:

Yes it should be safe

Explanation:

hope it helps :)

3 0
3 years ago
Assume variable age = 22, pet = "dog", and pet_name = "Gerald".
xeze [42]

Answer:

You are22years old.Gerladthedogis22

5 0
3 years ago
What is the output of the following C++ code? int list[5] = {0, 5, 10, 15, 20}; int j; for (j = 0; j &lt; 5; j++) cout &lt;&lt;
sesenic [268]

Answer:

what?

Explanation:

8 0
3 years ago
Which type of software coordinates the hardware and software of a computer to work efficiently and productively?
Mariana [72]
A. the operating system handles the I/O devices with the cpu, :)
7 0
4 years ago
Read 2 more answers
Other questions:
  • ATM machines respond to request in__________​
    13·1 answer
  • Which of the following statement is most accurate? A. A reference variable is an object. B. A reference variable refers to an ob
    6·1 answer
  • Which two ways should a developer create this functionality? A developer is asked to create a PDF quote document formatted using
    13·1 answer
  • You've just purchased 10 new notebook systems for your users. You are concerned that users will leave the systems on for long pe
    10·1 answer
  • Which student's strategy likely found the most academic success?
    6·1 answer
  • You are given a 11-bit floating point representation with 1-sign bit, 3 bits for the exponent, and 7-bits for the mantissa. Expr
    9·1 answer
  • I make a budget of my 1st Gamer PC its good?
    9·1 answer
  • What is the output?
    12·1 answer
  • Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the publi
    12·1 answer
  • Write algorithm and flowchart for the following<br>a.find the sum and average of any four numbers ​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!