Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What does the Spanning Tree Algorithm (STA) do?

A.) Restore lost frames

B.) Builds routing tables for routing through an internetwork

C.) Forward packets through a switch

D.) STA is implemented by STP to prevent loops



What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tab..

Answer / guest

Answer: D

IEEE 8021.d Spanning Tree Protocol (STP) was developed to
prevent

routing loops in a network. If a router, switch, or hub has
more then

one path to the same destination, a routing problem could
occur. To

prevent this, the Spanning Tree Protocol is executed between
the devices

to detect and logically block redundant paths from the
network. The main

function of the Spanning Tree Protocol is to allow redundant
network

paths without suffering the effects of loops in the network.

The Spanning Tree Algorithm (STA) implemented by STP
prevents loops by

calculating a stable Spanning Tree network topology. When
creating fault

tolerant internetworks, a loop-free path must exist between
all Ethernet

nodes in the network. Spanning Tree frames called Bridge
Protocol Data

Units (BPDUs) are sent and received by all switches in the
network at

regular intervals.

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More CCNA Interview Questions

Identify 3 characteristics of switches? A.) Increase available bandwidth B.) Decrease broadcast traffic C.) Support full duplex in a multipoint topology D.) Make fowarding decision using MAC address E.) Create collision domains

1 Answers  


What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer

1 Answers  


Which command displays access list 111? A. show access-list 111 B. show ip access-list 111 C. display ip access-list 111 D. display access-list 111 details

6 Answers   Satyam,


In which two modes can the ICMP ping command be used? (Choose two) A. user B. privileged C. global configuration D. interface configuration

1 Answers  


Which statement about the Committed Information Rate (CIP) is true? A. It is the rate in bits per second at which the Frame Relay switch agrees to transfer data B. It is the clock speed (pod speed) of the connection (local loop) to the Frame Relay cloud C. It is the maximum number of bits that switch can transferduring any Committed Rate Measurement Interval D. It is a signaling standard between the 3PE device and FP switch. It is responsible for managing the connection and maintaining status between the devices.

1 Answers  


Which three basic switch functions increase available bandwidth on the networks? (Choose three) A. loop avoidance B. address learning C. hop count limiting D. broadcast filtering E. packet forward/filtering F. broadcast packet hop count learning/forward/filtering

1 Answers  


How can you assign a vlan to a switch port?

0 Answers  


You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet

1 Answers  


What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.

1 Answers  


What is EIGRP?

0 Answers  


To monitor IP igrp traffic, you can use "debug IP igrp transaction" or "debug IP igrp events". How do you display information about IPX routing update packets? A. debug routing B. debug ipx transaction C. debug ipx routing activity D. debug ipx events

2 Answers  


As a system administrator, you perform an extended ping at the privileged EXEC prompt. As part of the display, you see "Set DF bit in IP header? [yes] :" What would happen if you answered no at the prompt. A. This lets the router fragment the packet. B. It tells the router not to fragment the packet. C. This lets the router direct the packet to the destination it finds in its routing table. D. It tell the router to send the packet to the next hop router.

1 Answers  


Categories