Which two configuration steps will prevent an unauthorized PC from accessing the corporate network?

Which two configuration steps will prevent an unauthorized PC from accessing the corporate network? (Choose two.)
A. set the port security aging time to 0
B. create the port as a protected port and statically assign the MAC address to the address table
C. configure the switch to discover new MAC addresses after a set time of inactivity
D. enable port security on the switch
E. create the port as an access port and statically assign the MAC address to the address table

cisco-exams

3 thoughts on “Which two configuration steps will prevent an unauthorized PC from accessing the corporate network?

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.