Refer to the exhibit. What type of attack is being defended against? ()
A. snooping attack B. rogue device attack C. STP attack D. VLAN attack E. spoofing attack F. MAC flooding attack
Refer to the exhibit. What will happen to traffic within VLAN 14 with a source address of 172.16.10.5?()
A. The traffic will be forwarded to the router processor for further processing. B. The traffic will be dropped. C. The traffic will be forwarded to the TCAM for further processing. D. The traffic will be forwarded without further processing.
Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1?()
A. The first address learned on the port will be removed from the secure address list and be replaced with the new address. B. All secure addresses will age out and be removed from the secure address list. This will cause the security violation counter to increment. C. The packets with the new source addresses will be dropped until a sufficient number of secure MAC addresses are removed from the secure address list. D. The interface will be placed into the error-disabled state immediately, and an SNMP trap notification will be sent.