单项选择题
A.The remaining secure MAC addresses will be dynamically learned, converted to sticky secure MAC addresses, and added to the running configuration.
B.Since a voice VLAN is configured in this example, port security should be set for a maximum of 2.
C.The sticky addresses will only be those manually configured MAC addresses enabled with the sticky keyword.
D.A security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.
单项选择题 When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port?()
单项选择题 WhenconfiguringportsecurityonaCiscoCatalystswitchport,whatisthedefaultactiontakenbytheswitchifaviolationoccurs?()
单项选择题 Whatisanimportantsteptotakewhenverifyinganewlyproposednetworksecuritysolution?()