1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
3 years ago
11

You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public

kiosk display that allows guests to access the Internet. You would like to implement port security to prevent guests from removing Ethernet cables from the hosts and connecting them to the Ethernet ports on their personal laptops. If guests attempt to connect through their personal laptops, you would like the switch to drop the frames.
Complete the following tasks:

a.Configure FastEthernet 0/2 through 0/4 as access ports.
b.On the FastEthernet 0/2 through 0/4, configure port security to learn and retain the MAC addresses of the connected hosts.
c.Configure the port security violation as protect on each applicable interface.
Save your changes to the startup-config file.
d.The switch is currently configured with the default port security settings. Use the show run command to verify the configurations.
Computers and Technology
1 answer:
irga5000 [103]3 years ago
4 0

Answer:

Port security and violation mode.

Explanation:

A switch is a layer two device of the OSI model. It is used to transmit frames between nodes within a network. It transfers frames by discovering the destination Mac address and saving it to its address table, and sending the frame to the egest port to the destination.

The port security command is used to specify the Mac addresses that are recognised by a port. There are three types of port security, they are, dynamic, static and sticky Mac addresses that can configured on an interface.

The security violation command is used to decide what happens to a port when it detects an unfamiliar Mac address. The three security violation modes are protect, restrict and shutdown. It is used as an interface command alongside the port security command.

You might be interested in
Write an algorithm to create a customer’s bill for a company. The company sells only five different products. TV, VCR, Remote Co
alukav5142 [94]

Answer:

so

tv= 400$

VCR= $220

remote controller= $35

CD Player= $280

Tap recorder= $90

so total = $1025 total

here 8% sale tax increase so is 82$ so

1025-82$ = 943 total amount

increase or decrease tax according to your question :)

6 0
3 years ago
How do you get access To The advance server in Mobile legends
kiruha [24]

Answer: To enter the Advanced Server, please follow the below instructions: Tap into the Profile section and click Account Settings. Tap on the Switch Server button on the bottom right of the screen. This will allow the player to switch between the Original Server and Advanced Server.

Explanation: I play Mobile legends a lot so I know this

4 0
2 years ago
How to order reference list in apa format?
Brums [2.3K]
<span>Title. Label this page References, centered in plain text.Spacing. Make sure to double space throughout.Order. List the sources in alphabetical order by the authors' last names. ...<span>Indentation. Do not indent the first line in the citation; however, you must indent any additional lines 5 spaces in the citation.</span></span>
5 0
3 years ago
In minecraft Education Edition what is the crafting recipe for Balloons and Glow sticks?
schepotkina [342]

Answer

sorry I only know how to make balloons :(

Explanation:

For the balloons the recipe that one is:

- you will need 6 latex

To make latex you will need two different elements one is 5 Carbon and the other one is 8 Hydrogen ( don't use crafting table to do it use the compound creator)

-Dye ( whatever color you want)

-Helium

-lead

Instructions

on the crafting table the latex will go on the sides (3 on the left and 3 on the right). The dye goes on top, the Helium in the middle and the lead at the bottom and there you go a balloon

8 0
3 years ago
Read 2 more answers
How can having more than one goal cause truble in the work place
siniylev [52]

Answer:

"Having more than one goal can cause problems at work as it makes it difficult to focus on just one thing and thus can lead to poor results. This is because by having multiple goals there is less concentration, less focus and therefore less ability to accomplish various goals at work with more efficiency and quality."

6 0
2 years ago
Other questions:
  • A(n) _______________ supplies one of the most critical aspects of docking stations, but in a smaller, more portable format: supp
    15·1 answer
  • Once Raul selects a technology solution, he has completed the process. <br> a. True<br> b. False
    13·2 answers
  • How can i do a back up on one computer and save it to the hard drive in another computer without it being seen by others on the
    9·1 answer
  • A file to which information is written is referred to as a(n) ____ file.
    8·1 answer
  • who will follow me on tiktok and like all my videos? if you do ill give branlist and give u a shoutout and you can enter my big
    15·1 answer
  • Chen needs to configure a filter on the current folder and would like to filter by the sender of a message. Which tab in the Fil
    7·2 answers
  • PAGE<br>DATE<br>0 What types of information should be there internet?​
    5·1 answer
  • 7.2 need help plzs 15 points
    13·1 answer
  • (25 POINTS) Some applications work on all devices while others work on some devices. True or False?
    13·1 answer
  • You should always be afraid to use the internet<br><br> True or false?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!