A. when they receive a special token B. when there is a carrier C. when they detect no other devices are sending D. when the medium is idle E. when the server grants access
A. Create an additional ACL to block the access to VLAN 1. B. Move the management VLAN to something other than default. C. Move all ports to another VLAN and deactivate the default VLAN. D. Limit the access in the switch using port security configuration. E. Use static VLAN in trunks and access ports to restrict connections. F. Shutdown all unused ports in the Catalyst switch.
A. The transport layer divides a data stream into segments and may add reliability and flow control information. B. The data link layer adds physical source and destination addresses and an FCS to the segment. C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information. D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment. E. The presentation layer translates bits into voltages for transmission across the physical link.