How does the Spanning Tree Protocol (STP) prevent bridging
loops?
A. By not allowing any redundant paths within the network
B. By calculating the metrics of each path
C. By detecting and logically blocking redundant paths from
the network
D. By creating virtual LANS
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
The Spanning Tree Protocol (STP) prevents bridging loops by
detecting and logically blocking redundant paths from the
network. The main function of STP is to allow redundant
paths without suffering the effects of loops in the network.
| Is This Answer Correct ? | 25 Yes | 0 No |
Answer / charubala
STP will identify the root and designated port for every
bridge. It will block all other ports from forwarding the
traffic. Once this is done, loops will be eliminated.
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / ambatic
Blocks redundant paths, making sure that only one link between two segments(i.e Switches)
| Is This Answer Correct ? | 0 Yes | 0 No |
The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct order. A. The PSE (Packet Switch Exchange) passes the packet to the next remote DCE B. The local DCE packet binder sends packet to the closest PSE (Packet Switch Exchange) C. The source DTE sends packet to the local DCE D. The remote DCE examines the packet header of destination DTE
What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs
What are two services that DUAL (Diffusing Update Algorithm) performs for EIGRP? A. Provides loop-free operation throughout an entire route?s computation B. Simultaneous synchronization of routers involved in a topology change C. Updates the autonomous system number D. Allows advertised distances to use feasible distances
Which of the following three protocols replace SDLC? A. 802.2 B. HDLC C. QLLC D. X.25
What set of Frame Relay enhancements offer extensions for managing complex internetworks? A. CMT B. SNMP C. LMI D. RMON
Which two LAN switching features apply to store-and-forward switches? A. CRC B. Frame length C. Source address D. Collision Windows
Client traffic is being bridged trough LAN interfaces on two WLCs.Which roaming option will Keep them on the same IP Subnet ?
ISDN is referenced by a suite of ITU-T (International Telecommunication Union Telecommunication Standardization Sector) standards encompassing what three layers of the OSI reference model? A. Physical B. Data Link (LAPD) C. Data Link (RMON) D. Network (Q.930 and Q.931)
What protocol advertises Netware services to network clients? (Type acronym).
5. Which Two Settings must be configured in order to use the GUI to configure Call Admission Control with voice Applications
The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems
What is the second step when creating a prototype? A. Develop a test plan B. Review the customer requirements C. Investigate what the competition will be proposing D. Define how big the prototype will be