How does the Spanning Tree Protocol (STP) prevent bridging
loops?

A. By not allowing any redundant paths within the network

B. By calculating the metrics of each path

C. By detecting and logically blocking redundant paths from
the network

D. By creating virtual LANS

Answers were Sorted based on User's Feedback



How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / guest

Answer: C

The Spanning Tree Protocol (STP) prevents bridging loops by
detecting and logically blocking redundant paths from the
network. The main function of STP is to allow redundant
paths without suffering the effects of loops in the network.

Is This Answer Correct ?    25 Yes 0 No

How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / charubala

STP will identify the root and designated port for every
bridge. It will block all other ports from forwarding the
traffic. Once this is done, loops will be eliminated.

Is This Answer Correct ?    3 Yes 0 No

How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / ambatic

Blocks redundant paths, making sure that only one link between two segments(i.e Switches)

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCDA Interview Questions

how many switches can be cascaded

2 Answers  


What happens when the hold-down timer expires? A. Routes are flushed from the routing table after the flush timer expires B. Routes are flushed from the routing table immediately C. Routes are never flushed D. A triggered update will reset the hold-down timer

1 Answers  


What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs

1 Answers  


OSPF supports priority routing for which TCP/IP feature? A. PA B. TCP C. IP D. SNA

1 Answers  


Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks

1 Answers  






In which category should Frame Relay be placed within the following Job Aid? Name of Protocol Type of Protocol # of Users # of Hosts or Servers Comments

1 Answers  


What is the second step when creating a prototype? A. Develop a test plan B. Review the customer requirements C. Investigate what the competition will be proposing D. Define how big the prototype will be

1 Answers  


What are the four basic components of an AppleTalk network? A. Sockets B. Nodes C. Networks D. Areas E. Zones

1 Answers  


Traffic Shaping does which one of the following? A. Eliminates bottlenecks by throttling back traffic volume at the source or outbound end B. Reduces the frame size so bandwidth is better utilized C. It increases source traffic to a configured bit rate D. Allows you to control hubs and repeaters

1 Answers  


Which of the following are true regarding switched virtual circuits (SVCs) and permanent virtual circuits (PVCs)? Choose two. A. SVCs and PVCs can use the same circuit. B. PVCs are permanently established virtual circuits. C. SVCs and PVCs terminate the circuit when data transmission is complete. D. SVCs are virtual circuits that are dynamically established on demand and terminated when data transmission is complete.

1 Answers  


What are two ways to connect a PC to a LAN when using ATM (Asynchronous Transfer Mode)? A. ATM endpoint B. ATM LAPB C. ATM router D. ATM switch

1 Answers  


What is the first step in diagramming packet flow for the terminals within a network? A. Identify the end user nodes of all the terminals B. Figure out the speed of all the servers C. Find out where all the routers are located D. Find out where all the switched are located

3 Answers  


Categories