How does the Spanning Tree Protocol (STP) prevent bridging
loops?
A. By not allowing any redundant paths within the network
B. By calculating the metrics of each path
C. By detecting and logically blocking redundant paths from
the network
D. By creating virtual LANS
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
The Spanning Tree Protocol (STP) prevents bridging loops by
detecting and logically blocking redundant paths from the
network. The main function of STP is to allow redundant
paths without suffering the effects of loops in the network.
| Is This Answer Correct ? | 25 Yes | 0 No |
Answer / charubala
STP will identify the root and designated port for every
bridge. It will block all other ports from forwarding the
traffic. Once this is done, loops will be eliminated.
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / ambatic
Blocks redundant paths, making sure that only one link between two segments(i.e Switches)
| Is This Answer Correct ? | 0 Yes | 0 No |
Which tools help to characterize a network? A. Sniffer B. CiscoWorks 2000 C. Netsys D. All of the above
What layer of the OSI reference model does TCP reside in? A. Session B. Transport C. Network D. Data-Link
You want to assign IP addresses to a large number of workstations. What is the best way to do this? A. Cisco Network Registrar B. Cisco IOS NAT Feature C. Assign them static IP addresses D. Let the workstation assign its own IP address
What protocol advertises Netware services to network clients? (Type acronym).
Match the following devices with the correct description. A. Switch 1. Operates at the physical layer and extends the cable as if it is a single cable. B. Router 2. Operates at the physical layer and connects all connections into one device or concentrator. C. Repeater 3. Operates at the network layer and can filter both hardware and network addresses. D. Hub 4. Works at the Data-Link layer and transmits a digital signal only to the specific port where the destination MAC address is located.
Match the following routing protocols with their routing algorithm. A. OSPF 1. Distance Vector B. IGRP 2. Link-State C. RIP D. IS-IS E. NLSP F. RTMP G. AURP H. BGP
Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200
What would you include in your prototype design for this particular case study?
Our company order a cisco ws-c3750x-48t-s(here i bought from http://www.3anetwork.com/cisco-ws-c3750x-48t-s-price_p104.html), As for the switch, in addition to the port module and optical module can be extended, what else module can also be extended?
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
Match the following routing techniques with the correct descriptions: A. Static Routing 1. Mandatory configuration B. Dynamic Routing 2. No route updates 3. Can better tolerate failures 4. Sends update when topology changes 5. Path is determined by the router 7. Traffic is reduced
When would you suggest static routes to your customers? A. When scalability is important B. When bandwidth is limited C. When the network will be changing frequently D. Always suggest static routes