What mechanism of loop protection is based on an element in a protocol header?

a. Spanning Tree Protocol
b. Time to live
c. Distance vector protocols
d. Ports


Answer: b. Time to live

Computer Science & Information Technology

You might also like to view...

Which of the following is the most widely used port scanning tool?

A) NSAuditor B) FreeNet Enumerator C) Nmap D) Share Enum

Computer Science & Information Technology

When you ________, the comment will shrink in size and become greyed out

A) edit a comment B) reply to a comment C) delete a comment D) mark a comment as done

Computer Science & Information Technology

A(n) _______ is an electronic component found in power supplies and CRT monitors that stores a charge even after power is removed

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which statement is true of arrays?

A. Only whole numbers can be used as array subscripts. B. Only whole numbers can be stored in arrays. C. Arrays cause more work for the programmer, but allow faster program execution. D. Array elements cannot be reset after the array is declared.

Computer Science & Information Technology