Which of the following would help Pete, an administrator, prevent access to a rogue access point connected to a switch?
A. Enable spanning tree protocol
B. Enable DHCP snooping
C. Disable VLAN trunking
D. Establish a MAC limit and age
Answer: D. Establish a MAC limit and age
Computer Science & Information Technology
You might also like to view...
Software designed for creating images, videos, and music usually offers ways to save your work in compressed file formats.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Explain the modifiers public, protected and private.
What will be an ideal response?
Computer Science & Information Technology
Name three things you should NEVER do during a presentation
What will be an ideal response?
Computer Science & Information Technology
Preliminary report pages are numbered with Arabic numbers (1, 2, 3).
Answer the following statement true (T) or false (F)
Computer Science & Information Technology