What is an easy way to configure a network to allow only a single computer to login on a particular jack?



What is an easy way to configure a network to allow only a single computer to login on a particular ..

Answer / chaitanya

Sticky ports are one of the network admin’s best friends and worst headaches. They allow you to set up your network so that each port on a switch only permits one (or a number that you specify) computer to connect on that port by locking it to a particular MAC address. If any other computer plugs into that port, the port shuts down and you receive a call that they can’t connect anymore. If you were the one that originally ran all the network connections then this isn’t a big issue, and likewise if it is a predictable pattern then it also isn’t an issue. However if you’re working in a hand-me-down network where chaos is the norm then you might end up spending a while toning out exactly what they are connecting to.

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More Computer Security Interview Questions

How do you protect your home Wireless Access Point?

1 Answers  


What is data source in computer?

0 Answers  


You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?

1 Answers  


How would you judge if a remote server is running IIS or Apache?

2 Answers  


What is the CIA triangle?

1 Answers  






What is a spooler on a computer?

0 Answers  


What is an easy way to configure a network to allow only a single computer to login on a particular jack?

1 Answers  


What are the most common computer applications?

0 Answers  


 How would you compromise an “Office Workstation” at a hotel?

1 Answers  


What is residual risk?

1 Answers  


 What is the difference between an HIDS and a NIDS?

1 Answers  


Why are internal threats oftentimes more successful than external threats?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)