An analyst will capture traffic from an air-gapped network that does not use DNS. The analyst is looking for unencrypted Syslog data being transmitted. Which of the following is most efficient for this purpose?
From a security perspective, how should the Root Bridge be determined in a Spanning Tree Protocol (STP) environment?