1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
3 years ago
11

You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public

kiosk display that allows guests to access the Internet. You would like to implement port security to prevent guests from removing Ethernet cables from the hosts and connecting them to the Ethernet ports on their personal laptops. If guests attempt to connect through their personal laptops, you would like the switch to drop the frames.
Complete the following tasks:

a.Configure FastEthernet 0/2 through 0/4 as access ports.
b.On the FastEthernet 0/2 through 0/4, configure port security to learn and retain the MAC addresses of the connected hosts.
c.Configure the port security violation as protect on each applicable interface.
Save your changes to the startup-config file.
d.The switch is currently configured with the default port security settings. Use the show run command to verify the configurations.
Computers and Technology
1 answer:
irga5000 [103]3 years ago
4 0

Answer:

Port security and violation mode.

Explanation:

A switch is a layer two device of the OSI model. It is used to transmit frames between nodes within a network. It transfers frames by discovering the destination Mac address and saving it to its address table, and sending the frame to the egest port to the destination.

The port security command is used to specify the Mac addresses that are recognised by a port. There are three types of port security, they are, dynamic, static and sticky Mac addresses that can configured on an interface.

The security violation command is used to decide what happens to a port when it detects an unfamiliar Mac address. The three security violation modes are protect, restrict and shutdown. It is used as an interface command alongside the port security command.

You might be interested in
Noticing his reduced performance at work, Dan enrolled himself for training sessions offered by the company and saw his producti
Luden [163]

A. self-efficacy.

B. overreward inequity.

C. expectancy.

D. cognitive distortion.

Answer:B. overreward inequity.

Explanation: Overreward inequity is a term mostly associated with the feeling of guilt by an employee who believes that his contributions to work or his performance rating is less than what he or she is been paid for.

An employee with this kind of guilt feelings will mostly like do his or her best to engage in in performance improvement Activities which includes enrollment for training and classes to enhance his or her performance.

6 0
2 years ago
When making an assembly of design what command is most.commonly used?
Schach [20]
There are two common command lines used in creating design assembly. The 'push' and 'pull' command. Both allows you to get parts from the original predelivered content's source desgian    and recreate the design faster and with less memory.
6 0
2 years ago
Very few games have any sort of narrative, not even a simple one that involves setting the mood through color, sound, environmen
Vladimir79 [104]

Answer:

B. False

Explanation:

Numerous amount of games have narrative, there is an entire genres built around narratives. Any RPG game has a narrative and even bog standard FPS games have some sort of backstory and effects setting a mood.

6 0
2 years ago
What is the use of an NDP?
Makovka662 [10]

Answer:

It defines five ICMPv6 packet types for router solicitation,router advertisement,neighbor solicitation,neighbor advertisement,and network redirects.

Explanation:

8 0
2 years ago
____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small,
LiRa [457]

Answer:

d.) Service-Oriented Architecture

Explanation:

Because its definition matches

4 0
3 years ago
Other questions:
  • One gigabyte can be expressed as: a.) 1,000 kilobytes b.) 1,000 bytes c.) 80,000 kilobytes d.) 1,000 megabytes e.) 8,000 bits
    5·1 answer
  • If I dribbled on my motherboard and I used windex to clean off the spit would it still work ?
    11·2 answers
  •  How does critically analyzing technology add value to interactions with people in personal and professional contexts?
    7·2 answers
  • er reports that he is having problems with his monitor. He explains that his laptop's liquid crystal display (LCD) is no longer
    13·1 answer
  • Reference variables allow arguments to be passed by ____________.
    7·1 answer
  • Pls help
    15·2 answers
  • What is the purpose of file extensions? A. They execute the mail merge function, B. They tell the operating system what kind of
    15·2 answers
  • What is a hardware device that allows you to connect to several computers and other devices to a single internet connection
    6·1 answer
  • Someone please help ASAP will brainlist
    9·2 answers
  • LCD, EL and gas-plasma are types of flat-panel screens.<br> True<br> False
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!