A network administrator needs to secure an access-layer switch port so that only authorized devices can connect and also wants to stop CAM/MAC address flooding attacks against the switch. Which technique should be configured on the interface to meet both goals?
Switch port security allows an administrator to specify or limit the number of MAC addresses that can appear on an interface. If an unknown or excessive MAC address is detected, the switch can drop frames or disable the port, stopping MAC-address flooding and blocking unapproved devices. 802.1X authenticates a user or device before opening the port but, once authenticated, a single host could still flood the switch. A captive portal operates after the device has basic network access, so it does not stop Layer 2 attacks. DHCP snooping only validates DHCP messages and prevents rogue DHCP servers; it does not limit MAC addresses on a port.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is switch port security and how does it work?
Open an interactive chat with Bash
What is an address flooding attack and why is it a threat?
Open an interactive chat with Bash
How does 802.1X authentication differ from switch port security?