單項(xiàng)選擇題What features set is most frequently used to prevent hackers from flooding a port with MAC- addresses?()

A.BPDU Guard
B.802.x
C.Port Security
D.Storm Control


您可能感興趣的試卷

你可能感興趣的試題

2.單項(xiàng)選擇題What is the statistical reserve?()

A.Bandwidth that is reserved for SVCs to route over a trunk
B.Bandwidth that is reserved on a trunk so that ABR connections can burst
C.Bandwidth on a trunk that is reserved for control traffic and cannot be used by connections
D.Bandwidth that cannot be allocated to connections but can be used to accommodate statistical variations in the traffic

3.單項(xiàng)選擇題What is TCI?()

A.Tag Calling Interface
B.Tag Control Identifier
C.ToS Class Interface
D.Tag Control Information

4.多項(xiàng)選擇題In which modes does selective packet discard(SPD)operate?()

A.normal
B.discard
C.random
D. full

5.多項(xiàng)選擇題Which two statements about VPLS are true? ()

A.There is a full mesh of pseudowires.
B.There is a partial mesh of pseudowires.
C.Only L2TPv3 can be used for pseudowire establishment.
D.There is split-horizon to avoid loops.

最新試題

Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()

題型:?jiǎn)雾?xiàng)選擇題

Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()

題型:多項(xiàng)選擇題

What layer of the TMN (telecommunications management network) model does CTM fit into?()

題型:?jiǎn)雾?xiàng)選擇題

How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement about the use of Route Target Rewrite is true?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement is FALSE concerning Concatenation?()

題型:?jiǎn)雾?xiàng)選擇題

Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()

題型:?jiǎn)雾?xiàng)選擇題

In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().

題型:多項(xiàng)選擇題

What is the BGP synchronization rule?()

題型:?jiǎn)雾?xiàng)選擇題

Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()

題型:多項(xiàng)選擇題