Which technologies listed below help prevent network loops in a
switched (bridged) environment?
A.) Store-and-Forward
B.) IEEE 802.1d
C.) Diikjstra Algorithm
D.) Cut-Through
E.) Spanning Tree Protocol
F.) Routing
Answer / guest
Answer: B E
The Spanning Tree Protocol (STP) eliminates loops by
disabling the
port(s) that are causing the bridging loop. This is also
called putting
a port into 'blocking' mode. The industry standard for STP
is IEEE 802.1d
| Is This Answer Correct ? | 5 Yes | 0 No |
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
What is the syntax to add a banner to the Cisco router? A.) motd banner # B.) banner C.) banner motd # D.) banner #
If bandwidth will increase what will happen?
Where shall i do CCNA cour??. can i do CCNA at home if yes then where shall i get CCNA book or simmulator.or if not then plz reff. me any good center in delhi
Which of the following use PVCs at layer 2? A.) X.25 B.) HDLC C.) Frame relay D.) ISDN
hi jitendra i am sunil here and i am an engineering student from delhi i have lots of interest in computer network.i was in serch of doing communication through MAC adressess.can u help me?
When configuring the subnet mask for an IP address, which formats can be used?A. dotted-decimal. B. Hexadecimal C. Bit-count D. Octal E. Binary
Explain on which interface we always apply access-list?
R1#sh ip nat translations Pro Inside global Inside local Outside local Outside global icmp 15.1.1.1:11 10.1.1.1:11 30.1.1.1:11 30.1.1.1:11 icmp 15.1.1.1:12 10.1.1.1:12 20.1.1.1:12 20.1.1.1:12 icmp 15.1.1.1:13 10.1.1.1:13 21.1.1.1:13 21.1.1.1:13 icmp 15.1.1.1:14 10.1.1.1:14 31.1.1.1:14 31.1.1.1:14 R1# So my question is that after every ip address [:] is used & some number. 15.1.1.1{:11}... what is this colon & number indicate. Can anyone tel me this..!!! Thanking you advance. Shahin
Interface 0/0 what does it mean?
What does the IPX maximum path command do? A.) Allows you to disable the TTL on an IPX packet B.) This parameter is only used in NLSP routing C.) Sets the maximum metric that can appear in the routing table D.) Configures round robin load sharing over multiple equal metric paths (parallel paths)
Which statement should you use to deny FTP access (only) from network 210 93 105 0 to network 223 8 151 0? A. access list 1 deny 210 93 105 0 0 0 0 0 any eq ftp access list 1 permit any B. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151 0 0 0 0 255 eq ftp C. access list 100 deny ip 223 8 151 0 0 0 0 255 any eq ftp access list 100 permit hp any any D. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151 0 0 0 0 255 eq ftp access list 100 permit ip any any