Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


How does the Spanning Tree Protocol (STP) prevent bridging
loops?

A. By not allowing any redundant paths within the network

B. By calculating the metrics of each path

C. By detecting and logically blocking redundant paths from
the network

D. By creating virtual LANS

Answers were Sorted based on User's Feedback



How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / guest

Answer: C

The Spanning Tree Protocol (STP) prevents bridging loops by
detecting and logically blocking redundant paths from the
network. The main function of STP is to allow redundant
paths without suffering the effects of loops in the network.

Is This Answer Correct ?    25 Yes 0 No

How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / charubala

STP will identify the root and designated port for every
bridge. It will block all other ports from forwarding the
traffic. Once this is done, loops will be eliminated.

Is This Answer Correct ?    3 Yes 0 No

How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redunda..

Answer / ambatic

Blocks redundant paths, making sure that only one link between two segments(i.e Switches)

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCDA Interview Questions

The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct order. A. The PSE (Packet Switch Exchange) passes the packet to the next remote DCE B. The local DCE packet binder sends packet to the closest PSE (Packet Switch Exchange) C. The source DTE sends packet to the local DCE D. The remote DCE examines the packet header of destination DTE

1 Answers  


What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs

1 Answers  


What are two services that DUAL (Diffusing Update Algorithm) performs for EIGRP? A. Provides loop-free operation throughout an entire route?s computation B. Simultaneous synchronization of routers involved in a topology change C. Updates the autonomous system number D. Allows advertised distances to use feasible distances

1 Answers  


Which of the following three protocols replace SDLC? A. 802.2 B. HDLC C. QLLC D. X.25

1 Answers  


What set of Frame Relay enhancements offer extensions for managing complex internetworks? A. CMT B. SNMP C. LMI D. RMON

1 Answers  


Which two LAN switching features apply to store-and-forward switches? A. CRC B. Frame length C. Source address D. Collision Windows

1 Answers  


Client traffic is being bridged trough LAN interfaces on two WLCs.Which roaming option will Keep them on the same IP Subnet ?

2 Answers   Pari Networks,


ISDN is referenced by a suite of ITU-T (International Telecommunication Union Telecommunication Standardization Sector) standards encompassing what three layers of the OSI reference model? A. Physical B. Data Link (LAPD) C. Data Link (RMON) D. Network (Q.930 and Q.931)

1 Answers  


What protocol advertises Netware services to network clients? (Type acronym).

1 Answers  


5. Which Two Settings must be configured in order to use the GUI to configure Call Admission Control with voice Applications

1 Answers   Pari Networks,


The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems

1 Answers  


What is the second step when creating a prototype? A. Develop a test plan B. Review the customer requirements C. Investigate what the competition will be proposing D. Define how big the prototype will be

1 Answers  


Categories