Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What does the Spanning Tree Algorithm (STA) do?

A.) Restore lost frames

B.) Builds routing tables for routing through an internetwork

C.) Forward packets through a switch

D.) STA is implemented by STP to prevent loops



What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tab..

Answer / guest

Answer: D

IEEE 8021.d Spanning Tree Protocol (STP) was developed to
prevent

routing loops in a network. If a router, switch, or hub has
more then

one path to the same destination, a routing problem could
occur. To

prevent this, the Spanning Tree Protocol is executed between
the devices

to detect and logically block redundant paths from the
network. The main

function of the Spanning Tree Protocol is to allow redundant
network

paths without suffering the effects of loops in the network.

The Spanning Tree Algorithm (STA) implemented by STP
prevents loops by

calculating a stable Spanning Tree network topology. When
creating fault

tolerant internetworks, a loop-free path must exist between
all Ethernet

nodes in the network. Spanning Tree frames called Bridge
Protocol Data

Units (BPDUs) are sent and received by all switches in the
network at

regular intervals.

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More CCNA Interview Questions

why we have to implement access list in router ??????what is the benifit and how it is configure

3 Answers   NIC, TCS,


What does the command “IP name-server 255.255.255.255&#8243; accomplish? a.It disables domain name lookup. b.It sets the domain name lookup to be a local broadcast. c.This is an illegal command. d.The command is now defunct and has been replaced by “IP server-name ip any”

5 Answers  


Identify the 4 that are not LAN technologies? A.) HDLC B.) FDDI C.) 802.5 D.) HSSI E.) SDLC F.) Frame Relay

1 Answers   AXA,


Hi Gyes, here is new question. can you provide answer of following question Like linux, can we windows as router? If yes how can we able to do this,

2 Answers  


what is secure hand shake protocol

2 Answers  


Explain how many types of router?

0 Answers  


What's the default CDP holdtime in seconds for Cisco routers? A.) 30 seconds B.) 180 seconds C.) 90 seconds D.) 60 seconds

3 Answers  


Which of the following are solutions to the problems encountered with Distance-Vector routing? A.) Defining a Maximum B.) Poison Reverse C.) Triggered Updates D.) Shortest path first algorithm. E.) Split Horizon

1 Answers  


Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address

1 Answers  


Using the TCP/IP protocol suite, a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of a MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses PARP requests D. It uses a router lookup table

1 Answers  


If you are running Token Ring with Novell IPX routing, which encapsulation should you use? A.) SAP B.) SNAP C.) 802.5 D.) 802.2

1 Answers  


What is the protocol number for TCP? A.) 80 B.) 21 C.) 11 D.) 6

3 Answers  


Categories