Connect Study Plan to Blog Content
Refine your search based on book part and/or chapter, along with content type, like Config Labs or Q&A.
The post listing below updates instantly after you check a box.
Click [+] to expand the lists to the right.
Books, Parts and Chapters
Lab and Question Post Types
Advanced Search Results …
IP uses Address Resolution Protocol (ARP) to discover the MAC address used by other hosts in the same subnet. Unfortunately, cybersecurity attacks often use legitimate protocols in…
Dynamic Host Configuration Protocol (DHCP), like many network protocols, can be used as part of a cybersecurity attack. DHCP Snooping, a LAN switch feature, monitors DHCP messages…
The Dynamic Host Configuration Protocol (DHCP) protocol allows DHCP Clients to lease an IP address from a DHCP server. Simple enough. However, the protocol itself is open…
The Cisco switch Port Security feature lets the switch monitor incoming frames, look at the source MAC address, and determine whether frames with that source address should…
Sometimes, #CCNA studiers get bogged down with port security, focusing on all those little optional configuration settings. But what of the main feature: securing the port? This…
Quick, can you name all the small options available with Cisco’s port security feature on Catalyst IOS images? Most of us can't, unless we're in the middle…
Cisco’s Port Security feature just happens to be one of those switch features that can confuse people until they’ve configured and tested it a few times. One…