How does the Spanning Tree Protocol (STP) prevent bridging
loops?

A. By not allowing any redundant paths within the network

B. By calculating the metrics of each path

C. By detecting and logically blocking redundant paths from
the network

D. By creating virtual LANS

Answers were Sorted based on User's Feedback



How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / guest

Answer: C

The Spanning Tree Protocol (STP) prevents bridging loops by
detecting and logically blocking redundant paths from the
network. The main function of STP is to allow redundant
paths without suffering the effects of loops in the network.

Is This Answer Correct ?    25 Yes 0 No

How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / charubala

STP will identify the root and designated port for every
bridge. It will block all other ports from forwarding the
traffic. Once this is done, loops will be eliminated.

Is This Answer Correct ?    3 Yes 0 No

How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / ambatic

Blocks redundant paths, making sure that only one link between two segments(i.e Switches)

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCDA Interview Questions

When should you apply SAP filters to Netware service advertisement messages? A. When services are not required for a particular area or network B. Only after service advertisement messages have flooded the network C. Before any type of router convergence takes place D. When no change in network services has taken place for 40 minutes

1 Answers  


What is the second step when creating a prototype? A. Develop a test plan B. Review the customer requirements C. Investigate what the competition will be proposing D. Define how big the prototype will be

1 Answers  


What are the four basic components of an AppleTalk network? A. Sockets B. Nodes C. Networks D. Areas E. Zones

1 Answers  


What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network

1 Answers  


The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct order. A. The PSE (Packet Switch Exchange) passes the packet to the next remote DCE B. The local DCE packet binder sends packet to the closest PSE (Packet Switch Exchange) C. The source DTE sends packet to the local DCE D. The remote DCE examines the packet header of destination DTE

1 Answers  






What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.

2 Answers  


What happens to performance if the maximum MTU (Maximum Transmission Unit) size is used? A. Performance increases B. Performance decreases C. Performance stays the same D. Performance has nothing to do with the MTU

1 Answers  


The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems

1 Answers  


What are three LAPB features supported by SDLC? A. Frame types B. Frame format C. Field functions D. ABM

1 Answers  


Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200

1 Answers  


OSPF supports priority routing for which TCP/IP feature? A. PA B. TCP C. IP D. SNA

1 Answers  


What is the technique used by a router that can automatically initiate and close a circuit-switched session? A. PLP B. LAPP C. ASN.1 D. DDR

1 Answers  


Categories