Spanning Tree Protocol

1. What is the purpose of Spanning Tree Protocol in a switched LAN?

A. To provide a mechanism for network monitoring in switched environments
B. To prevent routing loops in networks with redundant paths
C. To prevent switching loops in networks with redundant switched paths
D. To manage the VLAN database across multiple switches
E. To create collision domains

Correct Answer: C. To prevent switching loops in networks with redundant switched paths
Advertisement

2. Which statement describes a spanning-tree network that has converged?

A. All switch and bridge ports are in the forwarding state.
B. All switch and bridge ports are assigned as either root or designated ports.
C. All switch and bridge ports are in either the forwarding or blocking state.
D. All switch and bridge ports are either blocking or looping.

Correct Answer: C. All switch and bridge ports are in either the forwarding or blocking state.
Advertisement

3. What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?

A. Forwards the switch to the first available link
B. Drops the frame
C. Floods the network with the frame looking for the device
D .Sends back a message to the originating station asking for a name resolution

Correct Answer: C. Floods the network with the frame looking for the device
Advertisement

4. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?

A. During high-traffic periods
B. After broken links are reestablished
C. When upper-layer protocols require high reliability
D. In an improperly implemented redundant topology

Correct Answer: D. In an improperly implemented redundant topology
Advertisement

5. If you want to disable STP on a port connected to a server, which command would you use?

A. disable spanning-tree
B. spanning-tree off
C. spanning-tree security
D. spanning-tree portfast

Correct Answer: D. spanning-tree portfast
Advertisement
< PREVIOUS POSTIP Routing
NEXT POST >Security

Leave A Comment?