多項選擇題Which three options are considered in the spanning-tree decision process?()

A.lowest root bridge ID
B.lowest path cost to root bridge
C.lowest sender bridge ID
D.highest port ID
E.highest root bridge ID
F.highest path cost to root bridge


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which three options are features of VTP version 3?()

A.VTPv3 supports 8K VLANs.
B.VTPv3 supports private VLAN mapping.
C.VTPv3 allows for domain discovery.
D.VTPv3 uses a primary server concept to avoid configuration revision issues.
E.VTPv3 is not compatible with VTPv1 or VTPv2.
F.VTPv3 has a hidden password option.

2.單項選擇題Spanning Tree Protocol calculates path cost based on which of these? ()

A. interface bandwidth
B. interface delay
C. interface bandwidth and delay
D. hop count
E. bridge priority

3.多項選擇題Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()

A. Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot
B. UDLD protects against STP failures caused by cabling problems that create one-way links.
C. Loop guard detects and protects against duplicate packets being received and transmitted on different ports
D. UDLD protects against unidirectional cabling problems on copper and fiber media.
E. Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

4.多項選擇題Which two options are contained in a VTP subset advertisement?()

A.followers field
B.MD5 digest
C.VLAN information
D.sequence number

5.單項選擇題

Refer to the exhibit. In the diagram,the switches are running IEEE 802.1w RSPT. On which ports should root guard be enabled in order to facilitate deterministic root bridge election under normal and failure scenarios?()

A. GE-3/1, GE-3/2
B. FE-2/1, FE-3/2
C. GE-1/1, GE-1/2
D. GE-4/1, GE-4/2
E. GE-2/1, GE-2/2
F. GE-3/1, GE-3/2, GE-4/1, GE-4/2, FE-2/1, FE-3/2

最新試題

Which command is used to enable SSM with the range 232.0.0.0 - 255.0.0.0?()

題型:單項選擇題

You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()

題型:單項選擇題

An expanding company is deploying leased lines between its main site and two remote sites. Thebandwidth of the leased lines is 128kb/s each,terminated on different serial interfaces on the main router.These links are used for combined VOIP and data traffic. The network administrator has implemented a VOIP solution to reduce costs,and has therefore reserved sufficient bandwidth in a low latency queue oneach interface for the VOIP traffic. Users now complain about bad voice quality although no drops areobserved in the low latency queue. What action will likely fix this problem?()

題型:單項選擇題

Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()

題型:單項選擇題

What is also called Type 0 authentication in OSPF on Cisco Routers?()

題型:單項選擇題

What is the correct command to set the router ID for an OSPFv3 process?()

題型:單項選擇題

In order to configure two routers as anycast RPs, which of these requirements, af a minimum, must besatisfied?()

題型:單項選擇題

Which protocol and port have been assigned by IANA for RADIUS authentication?()

題型:單項選擇題

Which of the following is true about the MPLS header and its EXP field size?()

題型:單項選擇題

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()

題型:多項選擇題