Which technology is used by Catalyst switches to resolve
topology loops and ensure data flows properly through a
single network path?

A. virtual LANS (VLANS)

B. frame filtering

C. cut-through switching

D. spanning-tree protocol

Answers were Sorted based on User's Feedback



Which technology is used by Catalyst switches to resolve topology loops and ensure data flows prope..

Answer / guest

Answer: D

Is This Answer Correct ?    8 Yes 2 No

Which technology is used by Catalyst switches to resolve topology loops and ensure data flows prope..

Answer / riaz pilot

D.spanning-tree protocol

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More CCNA Interview Questions

10.1.1.0 n/w advertised as /16 from EIGRP & /24 from OSPF which will come in routing table & why

6 Answers   IBM,


Explain the difference between igp and eigrp?

0 Answers  


Which network mask should you place on a Class C network to accommodate a user requirement of ten subnetworks? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248

7 Answers  


The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC

3 Answers  


Which statement is true? A. While bridges are used to segment networks, they will not isolate broadcast or multicast packets. B. A bridge looks at every packet within its network segment and works like a hub re-broadcasting the packet if the destination is within its network segment. C. A bridge maintains a table of the IP addresses of the hosts within its network segment and forwards the packet directly to the destination based upon the IP address. D. A bridge resets the hop count by keeping all packets within the network segment. Only packets addressed to a specific destination host outside the network segment are allowed to pass through the bridge.

1 Answers  






How many types of memories are used in cisco router?

0 Answers  


Explain the term 'multicast'.

0 Answers  


You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.255.252, B,128.16.32.12, 128.16.32.15 B. 255.255.255.252, C,128.16.32.12, 128.16.32.15 C. 255.255.255.252, B,128.16.32.15, 128.16.32.12 D. 255.255.255.248, B,128.16.32.12, 128.16.32.15

1 Answers  


Which of the following describe full-duplex transmission? A.) Uses a single wire B.) Data transmission in only both directions, but only one way at a time C.) Uses a point-to-point connection from the transmitter of the transmitting station to the receiver of the receiving station D.) Data transmission in only one direction

1 Answers  


Which reserve port number talent use?

0 Answers  


Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)

0 Answers  


Which of the following is a layer 2 device? A.) Switch B.) Bridge C.) Repeater D.) Hub

2 Answers  


Categories