Which of the following protocols is Kim, a user, utilizing if no handshake or data reliability are required?
Which of the following protocols would Lisa, a technician, use to disable switch ports automatically to prevent switching loops?