Loop protection uses the _______________ standard spanning-tree algorithm (STA). Network Security Loop protection uses the _______________ standard spanning-tree algorithm (STA). a. IEEE 801.2d b. IEEE 802.3 c. IEEE 802.11n d. IEEE 802.1d Answer: D Learn More : Share this Share on FacebookTweet on TwitterPlus on Google+