Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


How does the Spanning Tree Protocol (STP) prevent bridging
loops?

A. By not allowing any redundant paths within the network

B. By calculating the metrics of each path

C. By detecting and logically blocking redundant paths from
the network

D. By creating virtual LANS

Answers were Sorted based on User's Feedback



How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / guest

Answer: C

The Spanning Tree Protocol (STP) prevents bridging loops by
detecting and logically blocking redundant paths from the
network. The main function of STP is to allow redundant
paths without suffering the effects of loops in the network.

Is This Answer Correct ?    25 Yes 0 No

How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / charubala

STP will identify the root and designated port for every
bridge. It will block all other ports from forwarding the
traffic. Once this is done, loops will be eliminated.

Is This Answer Correct ?    3 Yes 0 No

How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / ambatic

Blocks redundant paths, making sure that only one link between two segments(i.e Switches)

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCDA Interview Questions

Which tools help to characterize a network? A. Sniffer B. CiscoWorks 2000 C. Netsys D. All of the above

1 Answers  


What layer of the OSI reference model does TCP reside in? A. Session B. Transport C. Network D. Data-Link

1 Answers  


You want to assign IP addresses to a large number of workstations. What is the best way to do this? A. Cisco Network Registrar B. Cisco IOS NAT Feature C. Assign them static IP addresses D. Let the workstation assign its own IP address

1 Answers  


What protocol advertises Netware services to network clients? (Type acronym).

1 Answers  


Match the following devices with the correct description. A. Switch 1. Operates at the physical layer and extends the cable as if it is a single cable. B. Router 2. Operates at the physical layer and connects all connections into one device or concentrator. C. Repeater 3. Operates at the network layer and can filter both hardware and network addresses. D. Hub 4. Works at the Data-Link layer and transmits a digital signal only to the specific port where the destination MAC address is located.

1 Answers  


Match the following routing protocols with their routing algorithm. A. OSPF 1. Distance Vector B. IGRP 2. Link-State C. RIP D. IS-IS E. NLSP F. RTMP G. AURP H. BGP

1 Answers  


Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200

1 Answers  


What would you include in your prototype design for this particular case study?

1 Answers  


Our company order a cisco ws-c3750x-48t-s(here i bought from http://www.3anetwork.com/cisco-ws-c3750x-48t-s-price_p104.html), As for the switch, in addition to the port module and optical module can be extended, what else module can also be extended?

0 Answers   Aptron,


How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


Match the following routing techniques with the correct descriptions: A. Static Routing 1. Mandatory configuration B. Dynamic Routing 2. No route updates 3. Can better tolerate failures 4. Sends update when topology changes 5. Path is determined by the router 7. Traffic is reduced

1 Answers  


When would you suggest static routes to your customers? A. When scalability is important B. When bandwidth is limited C. When the network will be changing frequently D. Always suggest static routes

1 Answers  


Categories