Which of the following are the five Spanning-Tree Protocol states? (Select five.)

a. Blocking
b. Listening
c. Selecting
d. Learning
e. Forwarding
f. Disabled
g. Passing
h. Cut-through


a. Blocking
b. Listening
d. Learning
e. Forwarding
f. Disabled

Computer Science & Information Technology

You might also like to view...

What is the output of the following code?

cout << "This is a \\" << endl; a. This is a b. This is a \ c. nothing, it is a syntax error d. This is a \ endl

Computer Science & Information Technology

Some attackers might create a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim's laptop directly to the attacker's laptop. What is this type of network called?

A. wireless B. access C. link D. ad hoc

Computer Science & Information Technology

To take full advantage of SMM, Intel put forward the _______________ (APM) specification in 1992 and the _______________ (ACPI) standard in 1996.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A computer is generating a missing NTLDR error. From the Recovery Console, which of the following commands would BEST resolve this issue?

A. FORMAT B. DISKPART C. FDISK /MBR D. FIXMBR

Computer Science & Information Technology