What does the Spanning Tree Algorithm (STA) do?
A.) Restore lost frames
B.) Builds routing tables for routing through an internetwork
C.) Forward packets through a switch
D.) STA is implemented by STP to prevent loops
Answer / guest
Answer: D
IEEE 8021.d Spanning Tree Protocol (STP) was developed to
prevent
routing loops in a network. If a router, switch, or hub has
more then
one path to the same destination, a routing problem could
occur. To
prevent this, the Spanning Tree Protocol is executed between
the devices
to detect and logically block redundant paths from the
network. The main
function of the Spanning Tree Protocol is to allow redundant
network
paths without suffering the effects of loops in the network.
The Spanning Tree Algorithm (STA) implemented by STP
prevents loops by
calculating a stable Spanning Tree network topology. When
creating fault
tolerant internetworks, a loop-free path must exist between
all Ethernet
nodes in the network. Spanning Tree frames called Bridge
Protocol Data
Units (BPDUs) are sent and received by all switches in the
network at
regular intervals.
| Is This Answer Correct ? | 1 Yes | 1 No |
why we have to implement access list in router ??????what is the benifit and how it is configure
What does the command “IP name-server 255.255.255.255″ accomplish? a.It disables domain name lookup. b.It sets the domain name lookup to be a local broadcast. c.This is an illegal command. d.The command is now defunct and has been replaced by “IP server-name ip any”
Identify the 4 that are not LAN technologies? A.) HDLC B.) FDDI C.) 802.5 D.) HSSI E.) SDLC F.) Frame Relay
Hi Gyes, here is new question. can you provide answer of following question Like linux, can we windows as router? If yes how can we able to do this,
what is secure hand shake protocol
Explain how many types of router?
What's the default CDP holdtime in seconds for Cisco routers? A.) 30 seconds B.) 180 seconds C.) 90 seconds D.) 60 seconds
Which of the following are solutions to the problems encountered with Distance-Vector routing? A.) Defining a Maximum B.) Poison Reverse C.) Triggered Updates D.) Shortest path first algorithm. E.) Split Horizon
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address
Using the TCP/IP protocol suite, a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of a MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses PARP requests D. It uses a router lookup table
If you are running Token Ring with Novell IPX routing, which encapsulation should you use? A.) SAP B.) SNAP C.) 802.5 D.) 802.2
What is the protocol number for TCP? A.) 80 B.) 21 C.) 11 D.) 6