Learn how to prevent unauthorized devices from connecting to Cisco switch ports for the CCNA 200-301 exam. Discover how port security restricts access based on MAC addresses and enhances network protection.
Table of Contents
Question
A network administrator wants to configure a switch to prevent unauthorized devices from connecting to specific ports. Which feature should be implemented?
A. Port Mirroring
B. VLAN Trunking
C. Port Security
D. STP
E. BPDU Guard
Answer
C. Port Security
Explanation
Port Security allows a switch to restrict access based on MAC addresses, preventing unauthorized devices from connecting.
Port Security restricts access to switch ports by allowing only specified MAC addresses to connect, effectively preventing unauthorized devices from gaining network access. When enabled, port security can be configured to permit a set number of MAC addresses per port or to bind specific MAC addresses to a port. If an unauthorized device attempts to connect, the switch can take actions such as dropping packets, generating alerts, or shutting down the port entirely. This feature is essential for securing access ports and mitigating threats from rogue devices or unauthorized users.
Cisco Certified Network Associate CCNA 200-301 certification exam practice question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the Cisco Certified Network Associate CCNA 200-301 exam and earn Cisco Certified Network Associate CCNA 200-301 certification.