The table reviews the commands for implementing, verifying port, and removing port security on a switch. –