I remember a practice question about desktop sharing. Closing it when it's not needed seems like a smart move to avoid accidental sharing of sensitive info.
I'm a bit confused by the wording of the question. Is it asking about the specific means by which recognition programs create a positive environment? I'll have to read through the options carefully.
Okay, I think I know the answer here. The key is to break the STP loop, and the best way to do that is by enabling BPDU filter on the interfaces facing the MST switches.
Ah, I've seen this type of question before. I'm pretty confident the answer is using the FORCETRANS and PURGEORPHANEDTRANSACTIONS parameters. That should give me the control I need over the bounded recovery process.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Yoko
4 months agoRonald
4 months agoMelvin
4 months agoTammara
4 months agoLeonard
4 months agoHoa
5 months agoGilma
5 months agoRosamond
5 months agoShawnta
5 months agoBeatriz
5 months agoJose
5 months agoJutta
5 months ago