A.RSTP information is automatically aged out.
B.The port sends a TCN to the root bridge.
C.The port moves to listening state.
D.The port becomes a normal spanning tree port.
您可能感興趣的試卷
你可能感興趣的試題
A.CEF, distributed CEF (dCEF), fast switching, process switching
B.distributed CEF (dCEF), CEF, fast switching, process switching
C.fast switching, process switching, distributed CEF (dCEF), CEF
D.process switching, fast switching, distributed CEF (dCEF), CEF
E.process switching, distributed CEF (dCEF), CEF, fast switching
F.process switching, CEF, distributed CEF (dCEF), fast switching
A.LACP is used to connect to non-Cisco devices.
B.LACP packets are sent with the command channel-group 1 mode desirable.
C.LACP packets are sent with the command channel-group 1 mode active.
D.Standby interfaces should be configured with a higher priority.
E.Standby interfaces should be configured with a lower priority.
Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivity throughout the network, Front Line users have been complaining that they experience slower network performance when accessing the server farm than the Reception office experiences. Based on the exhibit,
which two statements are true?()
A.Changing the bridge priority of S1 to 4096 would improve network performance.
B.Changing the bridge priority of S1 to 36864 would improve network performance.
C.Changing the bridge priority of S2 to 36864 would improve network performance.
D.Changing the bridge priority of S3 to 4096 would improve network performance.
E.Disabling the Spanning Tree Protocol would improve network performance.
F.Upgrading the link between S2 and S3 to Gigabit Ethernet would improve performance.
A.The BID is made up of the bridge priority value(two bytes) and bridge MAC address (six bytes).
B.The BID is made up of the bridge priority (four bits), the system ID (12 bits), and a bridge MAC address (48 bits).
C.The BID is made up of the system ID (six bytes) and bridge priority value (two bytes).
D.The system ID value is the VLAN ID (VID).
E.The system ID value is a unique MAC address allocated from a pool of MAC addresses assigned to the switch or module.
F.The system ID value is a hex number used to measure the preference of a bridge in the spanning-tree algorithm.
Based on the show spanning-tree vlan 200 output shown in the exhibit,
which two statements about the STP process for VLAN 200 are true? ()
A.BPDUs will be sent out every two seconds.
B.The time spent in the listening state will be 30 seconds.
C.The time spent in the learning state will be 15 seconds.
D.The maximum length of time that the BPDU information will be saved is 30 seconds.
E.This switch is the root bridge for VLAN 200.
F.BPDUs will be sent out every 10 seconds.
最新試題
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
Which three statements about STP timers are true?()
Which statement is correct about RSTP port roles?()
Refer to the exhibit. On the basis of the output of the show spanning-tree inconsistentports command, which statement about interfaces FastEthernet 0/1 and FastEthernet 0/2 is true?()
Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()
How are STP timers and state transitions affected when a topology change occurs in an STP environment?()
Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()
Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()
Refer to the exhibit. For what purpose is the command show ip cef used?()
Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()