A.root port
B.backup port
C.designated port
D.alternate port
您可能感興趣的試卷
你可能感興趣的試題
A.For each such address and mask /32, one label binding is created.
B.As the TCP endpoint, IP addresses are used by the LDP session.
C.These addresses are used to find the label binding to put in the LFIB, by looking up these IP addresses in the routing table.
D.These addresses are used for penultimate hop popping (PHP) when forwarding packets to the next router directly.
A.highest-numbered IP interface
B.MAC address
C.device uptime
D.root port cost
A.CIR=TC/Bc
B.CIR=Be/Tc
C.Tc=CIR/Bc
D.Tc=Bc/CIR
A.Virtual Router Redundancy Protocol(VRRP)
B.File Transport Protocol(FTP)
C.Hot Standby Routing Protocol(HSRP)
D.Web Cache Communication Protocol(WCCP)
A.End system
B.Protocol
C.Application
D.Throughput
最新試題
Which statement is correct about an OSPF sham-link?()
For the following ports, which port is on every bridge in a Spanning Tree Protocol IEEE 802.1w network except the root bridge?()
Choose two commands that are required to enable multicast on a router, when it is known that the receivers use a specific functionality of IGMPv3.()
What is the STP root guard feature designed to prevent?()
Which message type is constructed and sent from an MSDP router to its MSDP peers when it receives a PIM register message (knowing that the MSDP router is also configured as an RP for the PIM domain)?()
Which three protocols should be explicitly managed by using Control Plane Policing on an Internet border router?()
In which way can the IPv6 address of 2031:0000:130F:0000:0000:09C0:876A:130B be expressed most efficiently?()
Multicast is being deployed in the network, and only ip pim sparse-dense mode has been configured on all interfaces in the network to support a new video streaming application. No other multicast configuration was applied anywhere in the network. Since enabling multicast, the network monitoring tools show periodic spikes in link utilization throughout the network, even in areas where the video application is not being used. What could be a possible cause?()
For the following protocols, which one provides a mechanism to transparently intercept and redirect CIFS traffic from a client to a local Cisco Wida Area Application engine?()
Phase I and Phase II DMVPN differ in terms of which of these characteristics?()