an attacker has bypassed physical security and was able to connect a laptop to an ethernet interface on a switch. if all the switch ports are configured with port security and the violation mode is set to the default, which action is taken against the attacker?