At what layer of the hierarchical model are MAC-based security controls implemented?
- access layer*
- distribution layer
- collapsed core layer
- core layer
Exam with this question: CCNP SWITCH Chapter 2 Exam Answers
Please login or Register to submit your answer