When you are configuring DHCP snooping, how should you classify access ports?
A.
untrusted
B.
trusted
C.
promiscuous
D.
private
When you are configuring DHCP snooping, how should you classify access ports?
When you are configuring DHCP snooping, how should you classify access ports?
A.
untrusted
B.
trusted
C.
promiscuous
D.
private