Which of the following would help Pete, an administrator, prevent access to a rogue access point connected to a switch?

A. Enable spanning tree protocol
B. Enable DHCP snooping
C. Disable VLAN trunking
D. Establish a MAC limit and age


Answer: D. Establish a MAC limit and age

Computer Science & Information Technology

You might also like to view...

Software designed for creating images, videos, and music usually offers ways to save your work in compressed file formats.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Explain the modifiers public, protected and private.

What will be an ideal response?

Computer Science & Information Technology

Name three things you should NEVER do during a presentation

What will be an ideal response?

Computer Science & Information Technology

Preliminary report pages are numbered with Arabic numbers (1, 2, 3).

Answer the following statement true (T) or false (F)

Computer Science & Information Technology