Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which technologies listed below help prevent network loops in a

switched (bridged) environment?

A.) Store-and-Forward

B.) IEEE 802.1d

C.) Diikjstra Algorithm

D.) Cut-Through

E.) Spanning Tree Protocol

F.) Routing



Which technologies listed below help prevent network loops in a switched (bridged) environment? ..

Answer / guest

Answer: B E

The Spanning Tree Protocol (STP) eliminates loops by
disabling the

port(s) that are causing the bridging loop. This is also
called putting

a port into 'blocking' mode. The industry standard for STP
is IEEE 802.1d

Is This Answer Correct ?    5 Yes 0 No

Post New Answer

More CCNA Interview Questions

what is diffrence betwwen mpls and frame really

1 Answers   Aptron, Volvo,


how many vlan can be configured on a single switch

12 Answers   IBM, Sigma IT,


Identify the command that forces the router to load into ROM mode upon a reload? A.) boot system rom B.) rom boot C.) boot system flash rom D.) boot router rom

1 Answers  


A ISDN BRI circuit can be described as a which of the following? A.) 3B channels B.) 2-64Kbps B channels and 1-16Kbps D channel C.) none of the above D.) 2-64Kbps B channels and 1-16Kbps C channel

1 Answers  


Given the following IP address from the Class B address range 172.35.21.12. Your network plan requires no more than 126 hosts on a shored. Which value should you use as the subnet mask? A. 255.255.0.0 B. 255.255.128.0 C. 255.255.126.0 D. 255.255.255.128 E. 255.255.255.252

5 Answers  


What key do you use to view the last command? A.) Left Arrow B.) Space Bar C.) Up Arrow D.) Right Arrow

2 Answers  


What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS

1 Answers  


In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this? A.) Defining a Maximum. B.) You can not solve the 'count to infinity' problem with a distance vector protocol. C.) Poison Reverse. D.) Triggered Updates. E.) Split Horizon.

2 Answers  


What do you understand by redundancy?

0 Answers  


Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session

2 Answers  


Identify the 2 types of access-list filters that control SAP traffic? A.) Novell-ether B.) Arpa C.) Input-sap-filter D.) Round-robin E.) Output-sap-filter

1 Answers  


What does the ping response & mean? * A: unreachable * B: congestion * C: user interrupt * D: unknown packet type * E: lifetime exceeded

6 Answers  


Categories