What does the Spanning Tree Algorithm (STA) do?
A.) Restore lost frames
B.) Builds routing tables for routing through an internetwork
C.) Forward packets through a switch
D.) STA is implemented by STP to prevent loops
Answer / guest
Answer: D
IEEE 8021.d Spanning Tree Protocol (STP) was developed to
prevent
routing loops in a network. If a router, switch, or hub has
more then
one path to the same destination, a routing problem could
occur. To
prevent this, the Spanning Tree Protocol is executed between
the devices
to detect and logically block redundant paths from the
network. The main
function of the Spanning Tree Protocol is to allow redundant
network
paths without suffering the effects of loops in the network.
The Spanning Tree Algorithm (STA) implemented by STP
prevents loops by
calculating a stable Spanning Tree network topology. When
creating fault
tolerant internetworks, a loop-free path must exist between
all Ethernet
nodes in the network. Spanning Tree frames called Bridge
Protocol Data
Units (BPDUs) are sent and received by all switches in the
network at
regular intervals.
Is This Answer Correct ? | 1 Yes | 1 No |
Can you explain VPN tunneled packet in detail?
Mention the conversion steps of data encapsulation?
Why would you use static routing instead of dynamic routing? A.) When you want automatic updates of the routing tables B.) All the time C.) When you have very few routes and want to conserve bandwidth D.) When you have a gateway of last resort
Name the command we give for see routing table?
If a router uses dynamic routing, how does it learn the route to remote networks? The router uses a DHCP request to obtain remote network numbers. The router uses a routing protocol to exchange routing info. with other routers. The router uses DNS request packets to obtain remote network numbers. The Network Administrator manually configures the remote networks.
Which routing protocols uses connection-oriented routing updates? A.) IGRP B.) UDP C.) RIP D.) IP E.) BGP
Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it
Write out a config to permit only the below MAC address to pass traffic through a port on your switch. in another way writhe a confrigation which permit only mac address trfaic through a port of your switch
Identify the 3 pieces of hardware you would not install to prevent broadcasts? A.) Switch B.) Repeater C.) Bridge D.) Router
Which two statements about frame tagging are true? (Choose two) A. A filtering table is developed for each switch. B. Frame tagging assigns a unique user defined ID to each frame. C. A unique identifier is placed in the header of each frame as it is forwarded between switches. D. Frame tagging is a technique that examines particular information about each frame based on user defined offsets.
what is firewall how fiarewall work how many interfaeces in the cisco pix 501 firewall what is the working of that dmz interface
The CSMA/CD Ethernet IEEE committee is defined as which of the following? A.) 802.2 B.) 802.3 C.) 802.4 D.) 802.5