What scenario might be ideal for the use of root guard in configuring a switch?

a. You wish to block BPDUs on an access port serving network hosts.
b. You wish to disable STP on a port connected to a partnered company's switch.
c. You wish to prevent switches beyond a certain port from becoming the root bridge, but still wish to use STP.
d. You wish to prevent a rogue switch or computer from hijacking the network's STP paths.


ANSWER: c

Computer Science & Information Technology

You might also like to view...

The number of bytes of memory used by a variable depends on its ___________.

A. value B. name C. data type D. size

Computer Science & Information Technology

The _____ error value means that a value is not available to a function or formula.

A. #NAME? B. #N/A C. #NULL! D. #NUM!

Computer Science & Information Technology

In BNF, the syntax of a language is specified as a series of rules. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When using a Windows Server 2016 striped volume, what is the size of the blocks that are striped across the members of the volume?

A. 8KB B. 16KB C. 32KB D. 64KB

Computer Science & Information Technology