1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melisa1 [442]
3 years ago
14

A network technician incorrectly wired switch connections in your organization's network. It effectively disabled the switch as

though it was a victim of denial of service attack. What should have be done to prevent this in the future?A. Install an IDS. B. Only use Layer 2 switches. C. Install SNMP on the switches. D. Implement STP or RSTP.
Computers and Technology
1 answer:
REY [17]3 years ago
5 0

Answer:

The answer is D. Implement STP or RSTP.

Explanation:

STP (Spanning Tree Protocol) was built to serve as a remedy for network issues. Existing before switches were developed, it works as a substitute for a switch when a switch is wired incorrectly (as seen in the question) or when it fails. STP has two roles:

  1. To serve as an alternative when there is network failure or changes.
  2. To block out issues caused by loops on a network

RSTP (Rapid Spanning Tree Protocol) was built to optimize the standard STP. When there is a topology change, spanning tree convergence is much faster than the standard STP.

To prevent network failure in the future, STP or RSTP should be implemented.

You might be interested in
In python, sorry if it’s blurry
stepan [7]

Answer:

nice

Explanation:

3 0
3 years ago
Read 2 more answers
A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which bene
a_sh-v [17]

Answer:

Redundant paths can be available without causing logical Layer 2 loops.

Explanation:

  • Spanning Tree Protocol is used to allow redundancy in the Layer 2 switched networks without creating cycles/circles also called loops.
  • These loops are called physical loops.
  • When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.
  • This affects the performance of the network as the result of broadcast packets flooding.
  • STP puts one port of the switch to forward mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to block mode and the one port that is left after this is placed in forward mode.
  • Spanning Tree Algorithm is used by STP to determine the optimal path  of switch to the network.
  • Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.
  • This information helps STP to eliminate the redundant paths.
  • So this is how STP tracks all the links in the switched network and eliminates redundant loops by allowing only one active path to the destination while blocking all other paths.
7 0
3 years ago
has anyone noticed to get credit for answering a question you don't even need to answer it correctly?
Helga [31]

Yes I've noticed this. Unfortunately it's up to the user (Asker) to report an answer incorrect.

8 0
4 years ago
Read 2 more answers
Which of the following emergencies are weather-related? A. Ice storm B. Hurricane C. Earthquake D. A and B
Angelina_Jolie [31]

Answer:

The answer is D. A and B

Explanation:

I think the answer is D because Ice storms are caused by freezing rain and Hurricanes are formed near the equator over warm ocean waters. both of them are weather-related.

5 0
3 years ago
Read 2 more answers
Which of the following statements invokes the GetDiscount function, passing it the contents of two Decimal variables named decSa
ryzh [129]

Answer:

c. decDiscount = GetDiscount(decSales, decRate)                                                                                                                          

Explanation:

Option a. is incorrect because it is using Call word which is not a valid way to invoke a function.

Similarly option b. is also incorrect because it uses Call word to invoke function GetDiscount() which is not a valid way to call a function and also it is passing it the contents of three variables decSales, decRate and decDiscount and as mentioned in the question only two parameters are to be passed to GetDiscount() function.

Option c. is correct as it invokes the function GetDiscount() and passes it the contents of two variables decSales and decRate and assigns this to a variable decDiscount. For example if the GetDiscount() method has to calculate the discount using decSales and decRate then the resultant value of this computation is assigned to decDiscount. So whatever this function returns or computers is assigned to and stored in decDiscount variable. So this is a valid way to invoke a method.

3 0
3 years ago
Other questions:
  • Which of the following situations would not require knowledge of networking?
    6·1 answer
  • A looping construct that continues to repeat until the expression becomes false is
    5·2 answers
  • Which of the following is a professional organization in the field of IT? Society for the Prevention of Cruelty to Animals (SPCA
    6·2 answers
  • Helena purchased a security software package to protect her new laptop against threats such as spyware and computer viruses. she
    14·1 answer
  • Tfuuvj vjiibjoon Ghosh kpj
    13·2 answers
  • PLZZZ HELP 30 POINTS!!
    14·1 answer
  • Which software documentation guideline did the IEEE establish?
    10·1 answer
  • What are 3 customizations that can be done using the header/footer section in the customize reports tray?.
    14·1 answer
  • Which website offers guidance on putting together a checklist to provide guidance on configuring and hardening operating systems
    12·1 answer
  • What is the function of tab?<br>​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!