An administrator, Ann, wants to ensure that only authorized devices are connected to a switch. She decides to
control access based on MAC addresses. Which of the following should be configured?

A.
Implicit deny
B.
Private VLANS
C.
Flood guard
D.
Switch port security
If we are dealing with MAC addresses shouldn’t we worry about MAC flooding?
Shouldn’t the answer be C?
0
0