How does the Spanning Tree Protocol (STP) prevent bridging
loops?
A. By not allowing any redundant paths within the network
B. By calculating the metrics of each path
C. By detecting and logically blocking redundant paths from
the network
D. By creating virtual LANS
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
The Spanning Tree Protocol (STP) prevents bridging loops by
detecting and logically blocking redundant paths from the
network. The main function of STP is to allow redundant
paths without suffering the effects of loops in the network.
Is This Answer Correct ? | 25 Yes | 0 No |
Answer / charubala
STP will identify the root and designated port for every
bridge. It will block all other ports from forwarding the
traffic. Once this is done, loops will be eliminated.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / ambatic
Blocks redundant paths, making sure that only one link between two segments(i.e Switches)
Is This Answer Correct ? | 0 Yes | 0 No |
When should you apply SAP filters to Netware service advertisement messages? A. When services are not required for a particular area or network B. Only after service advertisement messages have flooded the network C. Before any type of router convergence takes place D. When no change in network services has taken place for 40 minutes
What is the second step when creating a prototype? A. Develop a test plan B. Review the customer requirements C. Investigate what the competition will be proposing D. Define how big the prototype will be
What are the four basic components of an AppleTalk network? A. Sockets B. Nodes C. Networks D. Areas E. Zones
What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network
The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct order. A. The PSE (Packet Switch Exchange) passes the packet to the next remote DCE B. The local DCE packet binder sends packet to the closest PSE (Packet Switch Exchange) C. The source DTE sends packet to the local DCE D. The remote DCE examines the packet header of destination DTE
What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.
What happens to performance if the maximum MTU (Maximum Transmission Unit) size is used? A. Performance increases B. Performance decreases C. Performance stays the same D. Performance has nothing to do with the MTU
The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems
What are three LAPB features supported by SDLC? A. Frame types B. Frame format C. Field functions D. ABM
Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200
OSPF supports priority routing for which TCP/IP feature? A. PA B. TCP C. IP D. SNA
What is the technique used by a router that can automatically initiate and close a circuit-switched session? A. PLP B. LAPP C. ASN.1 D. DDR