Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which technologies listed below help prevent network loops in a

switched (bridged) environment?

A.) Store-and-Forward

B.) IEEE 802.1d

C.) Diikjstra Algorithm

D.) Cut-Through

E.) Spanning Tree Protocol

F.) Routing



Which technologies listed below help prevent network loops in a switched (bridged) environment? ..

Answer / guest

Answer: B E

The Spanning Tree Protocol (STP) eliminates loops by
disabling the

port(s) that are causing the bridging loop. This is also
called putting

a port into 'blocking' mode. The industry standard for STP
is IEEE 802.1d

Is This Answer Correct ?    5 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which OSI layer performs code conversion, code formatting and encryption? A.) Physical B.) Data-Link C.) Application D.) Transport E.) Presentation F.) Network

1 Answers  


What is 10base5 ethernet lans?

0 Answers  


What parameter is used with statically assigned routers to tell packets which interface to use to reach a distant network? A.) Mask B.) Subnet C.) Default gateway D.) Interface

1 Answers  


What is VLSM? how to Calculate VLSM? where it is use and why?

13 Answers  


Which layer is responsible for determining if sufficient resources for the intended communication exists? A.) Application B.) Network C.) Session D.) Presentation E.) Transport

3 Answers  


Which type of transmission bus topology support?

0 Answers  


Which command we give on privilege mode for coming back to user execution mode?

0 Answers  


Which port are used by Viruses? TCP or UDP?

8 Answers  


During encapsulation, in which order is information packaged? A. Data, Packet, Segment, Frame B. Segment, Data, Packet, Frame C. Data, Segment, Packet, Frame D. Packet, Data, Segment, Frame E. Frame, Data, Segment, Packet F. Bread, Peanut Butter, Jelly, Bread

3 Answers  


which term use to allow user to conect the remote n/w with ppp dail up conection ras sap sonet mane answer rsa

1 Answers  


Identify the command to configure the IP address 172.16.100.5 255.255.255.0? A.) Router(config-if)# ip address 172.16.100.5 255.255.255.0 B.) Router(config)# ip address 172.16.100.5 C.) Router# ip address 172.16.100.5 255.255.255.0 D.) Router(config)# ip address 172.16.100.5 255.255.255.0

2 Answers  


What are four functions/characteristics of the network layer of the OSI model? (Choose four) A. It uses a two-part address B. It maintains routing tables C. It uses broadcast addresses D. It establishes network addresses E. It provides access to the LAN media F. It provides media independence for upper layers G. It provides path selection for Internetwork communication

1 Answers  


Categories