Match each item with a statement below:

A. a layer 2 link management protocol designed to prevent looping on bridges and switches
B. the normal operating states of ports when the root bridge is available and all paths are functioning as expected
C. prevent logical loops during a period of transition from one root bridge to another
D. an IEEE standard governed as 802.1w
E. a group of network devices that will receive LAN broadcast traffic from each other
F. a complex process that involved one table for each VLAN and a master table that was shared by all VLANs
G. involves adding a four-byte field to the actual Ethernet frame to identify the VLAN and other pertinent information
H. a type of frame tagging
I. manage all of the configured VLANs that traverse trunks between switches


A. STP
B. Stable states
C. Transitory states
D. RSTP
E. Broadcast domain
F. Frame filtering
G. Frame tagging
H. LAN emulation
I. VLAN trunking protocol

Computer Science & Information Technology

You might also like to view...

The ____________, which appears at the beginning of a method definition, lists several important things about the method, including the method's name and list of parameters.

a. method description b. method body c. method specification d. method header

Computer Science & Information Technology

An advantage of inheritance is that:

a. All methods can be inherited. b. All instance variables can be uniformly accessed by subclasses and superclasses. c. Objects of a subclass can be treated like objects of their superclass. d. None of the above.

Computer Science & Information Technology

The ____ tools are the most basic tools available for making selections in Photoshop.

A. Graphic Selection B. Lasso C. Marquee D. Select

Computer Science & Information Technology

To change the paragraph from a numbered list to normal text, you can click the Text button in the Styles group on the Format tab.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology