answersLogoWhite

0


Best Answer

Port security is used on a switch and the number of secure MAC addresses for a port is reached, the violation mode that will typically cause an SNMP trap to be sent and traffic to be dropped is the "Shutdown" or "Protect" violation mode.

User Avatar

JOHNNY BRAVOOO00

Lvl 2
8mo ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

restrict

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: When port security is used on a switch which violation mode will cause an snmp trap to be sent and traffic to be dropped when the number of secure MAC address for a port is reached?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is mean by 0.0.0.0 ip address?

Computers normally show an address of 0.0.0.0 when they are not connected to a TCP/IP network. Having this address, a computer cannot be reached or communicate with any other devices over IP. TCP/IP software applications also use 0.0.0.0 as a programming technique to monitor network traffic from any valid IP address. While connected computers do not use this address, messages carried over IP sometimes include 0.0.0.0 inside the header when the source of the message is unknown.


What is address sequencing in computer organization?

Microinstructions are stored in control memory in groups, with each group specifying routine. Each computer instruction has its own microprogram routine in control memory to generate the microoperations that execute the instruction. The hardware that controls the address sequencing of the control memory must be capable of sequencing the microinstructions within a routine and be able to branch from one routine to another. To appreciate the address sequencing in a microprogram control unit, let us enumerate the steps that the control must undergo during the execution of a single computer instruction. An initial address is loaded into the control address register when power is turned on in the computer. This address is usually the address of the first microinstruction that activates the instruction fetch routine. The fetch routine may be sequenced by incrementing the control address register through the rest of its microinstructions. At the end of the fetch routine, the instruction is in the instruction register of the computer. The control memory next must go through the routine that determines the effective address of the operand. A machine instruction may have bits that specify various addressing modes, such as indirect address and index registers. The effective address computation routine in control memory can be reached through a branch microinstruction, which is conditioned on the status of the mode bits of the instruction. When the effective address computation routine is completed, the address of the operand is available in the memory address register. The next step is to generate the microoperations that execute the instruction fetched from memory. The microoperation steps to be generated in processor register depend on the operation code part of the instruction. Each instruction has its own microprogram routine stored in a given location of control memory. The transformation from the instruction code bits to an address in control memory where the routine is located is referred to as a mapping process. A mapping procedure is a rule that transforms the instruction code into a control memory address. Once the required routine is reached, the microinstructions that execute the instruction may be sequenced by incrementing the control address register, but sometimes the sequence of microoperations will depend on values of certain status bits in processor registers. Micro programs that employ subroutines will require an external register for storing the return address. Return addresses cannot be stored in ROM because the unit has no writing capability. When the execution of the instruction is completed, control must return to the fetch routine. This is accomplished by executing an unconditional branch microinstruction to the first address of the fetch routine. In summary, the address sequencing capabilities required in control memory are: 1. Incrementing of the control address register. 2. Unconditional branch or conditional branch, depending on statues bit conditions. 3. A mapping process from the bits of the instruction to an address for control memory. 4. A facility for subroutine call and return.


Why does James Gleick say that the ancient technology of books has reached a shining moment?

the printed book can now be cherished as a physical object.


What destination IP address will PC1 place in the header for a packet destined for PC2?

A data packet is split into three parts: The header, the payload and the trailer.The header contains the basic instructions about the data packet which should include:The packet lengthSynchronization (a few check bits to match up to the network)Originating IP Address (i.e. PC 1)Destination IP Address (i.e. PC 2)ProtocolPacket numberThe payload is the main body of data that is being sent. The size of the data can be a fixed length or a variable amount. If it is a fixed length, then this can be padded with blank data, so that each packet remains the same size.The trailer or footer contains data that tells the destination computer that it has reached the end of the packet. The trailer may also contain error checking information. This will tell the receiving computer to tell the originating source that the information was received.


What is PING used for?

The ping utility allows users to test if a host can be reached on an IP network, as well as the round-trip time for messages from a host to a destination. Response times are generally tracked in milliseconds.

Related questions

When port security is used on a switch which violation mode will cause an SNMP trap to be sent and traffic to be dropped when the number of secure MAC addresses for a port is reached?

please choose what is the correct answer.. tnx..stickyprotectrestrictshutdown


Can you put the word burglar in a sentence?

Are you a burglar? The burglar dropped his tools when he reached for his gun. The store's security system was over-ridden by last night's burglar.


How much social security is deducted from 102000 income?

I have reached $102,00 and my decuction for the year is $6,324.


What is Robinho's address?

Robson de Souza commonly refereed to as Robinho has not publicly shared his address. He can however be reached on social media.


What is the address for the Bright Star credit union?

The address for the Bright Star Credit Union can be reached at PO Box 8966 Ft Lauderdale, Florida. They can be reached by calling the toll free number 1-800-637-2728.


Website address for doll artiste maryse Nicole?

newtest3 she can be reached at, info@marysenicole.com


In halo 3 you got 795 gamerscore and it wont give you the secuirity shoulders?

well I got my security shoulders when I reached the gamescore of 850. That sucks I know but I got Katana and security helmet at the same time at the gamescore of 980...pretty glitchy eh? My friend got them when he reached 450. Security shoulders are known to be really glitchy :D


What does alternative email address mean?

an alternate email address is another email address you can be reached at.... like: email:1234@hotmail.com..... Alternate email:5678@hotmail.com......


Once something has expired on your credit report can it be put back on?

No, once it has reached the SOL for reporting. That is called reinsertion or re-aging the trade line which is a violation of the FCRA.


What is the address for a merrill lynch transfer?

The email address for a Merill lynch transfer is benefitplans@baml.com. They can also be reached on telephone by calling the number +18778952176.


What is the corporate address for PAC sun?

PacSun does not list its corporate address on its website. However, it is in Anaheim, CA, and they can be reached by calling 714-414-4909.


What was the conference where an international agreement was reached on navel disarmament and pacific security?

the kellog briand pact home slice