How does the Spanning Tree Protocol (STP) prevent bridging
loops?
A. By not allowing any redundant paths within the network
B. By calculating the metrics of each path
C. By detecting and logically blocking redundant paths from
the network
D. By creating virtual LANS
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
The Spanning Tree Protocol (STP) prevents bridging loops by
detecting and logically blocking redundant paths from the
network. The main function of STP is to allow redundant
paths without suffering the effects of loops in the network.
Is This Answer Correct ? | 25 Yes | 0 No |
Answer / charubala
STP will identify the root and designated port for every
bridge. It will block all other ports from forwarding the
traffic. Once this is done, loops will be eliminated.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / ambatic
Blocks redundant paths, making sure that only one link between two segments(i.e Switches)
Is This Answer Correct ? | 0 Yes | 0 No |
What PPP frame initiates the network layer protocols to be used during a connection?
The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
What are two differences between 10BaseT and 100BaseT? A. Speed B. Frame format C. Addressing D. Network diameter
difference between layer 3 switch and router
0 Answers Aptron, Tech Mahindra,
Which two of the following describe ASN.1 (Abstract Syntax Notation One)? A. It is an abstract routing protocol that is not used very often. B. It is an OSI language for describing data types independent of particular computer structures and representation techniques. C. Consists of only one basic routing algorithm. D. Uses BER (Basic Encoding Rules).
What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link
What are two services that the OSPF Hello protocol provides? A. It discovers neighbor routers B. It gets routes from neighbors during startup C. It helps elect a designated router D. It allows administrator to test for connectivity between two devices
You want to assign IP addresses to a large number of workstations. What is the best way to do this? A. Cisco Network Registrar B. Cisco IOS NAT Feature C. Assign them static IP addresses D. Let the workstation assign its own IP address
Which two statements correctly identify considerations to take into account when deciding on campus QoS Design elements ?
5. Which Two Settings must be configured in order to use the GUI to configure Call Admission Control with voice Applications
What category or categories does Client/Server fit into the following Job Aid? Name of Protocol Type of Protocol # of Users # of Hosts or Servers Comments