Last Updated on April 26, 2021 by Admin
Which technology is used to protect the switched infrastructure from problems caused by receiving BPDUs on ports that should not be receiving them?
- Root guard
- Loop guard
- BPDU guard
Answers Explanation & Hints:
To form a single path through a Layer 2 network, Layer 2 devices communicate with one another by the use of bridge protocol data units (BPDUs) as part of the Spanning Tree Protocol (STP). An attacker manipulates STP by spoofing the root bridge so that a device that is controlled by the attacker becomes a root bridge. The attacker can then obtain more information about the network or networks. BPDU guard can be used on ports that connect to user devices that are configured with PortFast so that BPDUs will not be accepted through that port.