How does the Spanning Tree Protocol (STP) prevent bridging
loops?

A. By not allowing any redundant paths within the network

B. By calculating the metrics of each path

C. By detecting and logically blocking redundant paths from
the network

D. By creating virtual LANS

Answers were Sorted based on User's Feedback



How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / guest

Answer: C

The Spanning Tree Protocol (STP) prevents bridging loops by
detecting and logically blocking redundant paths from the
network. The main function of STP is to allow redundant
paths without suffering the effects of loops in the network.

Is This Answer Correct ?    25 Yes 0 No

How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / charubala

STP will identify the root and designated port for every
bridge. It will block all other ports from forwarding the
traffic. Once this is done, loops will be eliminated.

Is This Answer Correct ?    3 Yes 0 No

How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / ambatic

Blocks redundant paths, making sure that only one link between two segments(i.e Switches)

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCDA Interview Questions

What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.

2 Answers  


EIGRP was developed to improve what two protocols? A. OSPF B. RIP C. BGP D. IGRP

7 Answers  


The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems

1 Answers  


How many networks will be advertised using route summarization within an OSPF network if you are given the following networks? 192.108.168.0 192.108.169.0 192.108.170.0 192.108.171.0 192.108.172.0 192.108.173.0 192.108.174.0 192.108.175.0 A. 1 B. 2 C. 3 D. 4 E. 5

1 Answers  


What AppleTalk protocol permits AppleTalk workstations to share files across a network?

1 Answers  






When should you apply SAP filters to Netware service advertisement messages? A. When services are not required for a particular area or network B. Only after service advertisement messages have flooded the network C. Before any type of router convergence takes place D. When no change in network services has taken place for 40 minutes

1 Answers  


What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing

1 Answers   Cisco,


Which two statements correctly identify considerations to take into account when deciding on campus QoS Design elements ?

1 Answers   Pari Networks,


What are two services that DUAL (Diffusing Update Algorithm) performs for EIGRP? A. Provides loop-free operation throughout an entire route?s computation B. Simultaneous synchronization of routers involved in a topology change C. Updates the autonomous system number D. Allows advertised distances to use feasible distances

1 Answers  


With Centralized Routing, each node must determine and maintain its routing information independently? A. True B. False

1 Answers  


What are two true statements regarding DDR (Dial-on-Demand Routing)? A. Allows a router to automatically initiate and end a circuit-switched session B. DDR cannot be configured because it is set with a default configuration C. Can configure it to be used during non-peak hours D. Can only be used with Cisco PIX

1 Answers  


What happens when the hold-down timer expires? A. Routes are flushed from the routing table after the flush timer expires B. Routes are flushed from the routing table immediately C. Routes are never flushed D. A triggered update will reset the hold-down timer

1 Answers  


Categories