What scenario might be ideal for the use of root guard in configuring a switch?
a. You wish to block BPDUs on an access port serving network hosts.
b. You wish to disable STP on a port connected to a partnered company's switch.
c. You wish to prevent switches beyond a certain port from becoming the root bridge, but still wish to use STP.
d. You wish to prevent a rogue switch or computer from hijacking the network's STP paths.
ANSWER: c
You might also like to view...
The number of bytes of memory used by a variable depends on its ___________.
A. value B. name C. data type D. size
The _____ error value means that a value is not available to a function or formula.
A. #NAME? B. #N/A C. #NULL! D. #NUM!
In BNF, the syntax of a language is specified as a series of rules. _________________________
Answer the following statement true (T) or false (F)
When using a Windows Server 2016 striped volume, what is the size of the blocks that are striped across the members of the volume?
A. 8KB B. 16KB C. 32KB D. 64KB