多項選擇題Which three options are considered in the spanning-tree decision process?()

A.lowest root bridge ID
B.lowest path cost to root bridge
C.lowest sender bridge ID
D.highest port ID
E.highest root bridge ID
F.highest path cost to root bridge


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which three options are features of VTP version 3?()

A.VTPv3 supports 8K VLANs.
B.VTPv3 supports private VLAN mapping.
C.VTPv3 allows for domain discovery.
D.VTPv3 uses a primary server concept to avoid configuration revision issues.
E.VTPv3 is not compatible with VTPv1 or VTPv2.
F.VTPv3 has a hidden password option.

2.單項選擇題Spanning Tree Protocol calculates path cost based on which of these? ()

A. interface bandwidth
B. interface delay
C. interface bandwidth and delay
D. hop count
E. bridge priority

3.多項選擇題Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()

A. Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot
B. UDLD protects against STP failures caused by cabling problems that create one-way links.
C. Loop guard detects and protects against duplicate packets being received and transmitted on different ports
D. UDLD protects against unidirectional cabling problems on copper and fiber media.
E. Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

4.多項選擇題Which two options are contained in a VTP subset advertisement?()

A.followers field
B.MD5 digest
C.VLAN information
D.sequence number

5.單項選擇題

Refer to the exhibit. In the diagram,the switches are running IEEE 802.1w RSPT. On which ports should root guard be enabled in order to facilitate deterministic root bridge election under normal and failure scenarios?()

A. GE-3/1, GE-3/2
B. FE-2/1, FE-3/2
C. GE-1/1, GE-1/2
D. GE-4/1, GE-4/2
E. GE-2/1, GE-2/2
F. GE-3/1, GE-3/2, GE-4/1, GE-4/2, FE-2/1, FE-3/2

7.單項選擇題Which command is used to enable EtherChannel hashing for Layer 3 IP and Layer 4 port-based CEF?()

A.mpls ip cef
B.port-channel ip cef
C.mpls ip port-channel cef
D.port-channel load balance
E.mpls ip load-balance
F.ip cef EtherChannel channel-id XOR L4
G.ip cef connection exchange

8.單項選擇題

Refer to the exhibit. In the diagram, the switches are running IEEE 802.1s MST. Which ports are in the MST blocking state?()

A. GE-1/2 and GE 2/1
B. GE-1/1 and GE-2/2
C. GE-3/2 and GE 4/1
D. no ports are in the blocking state
E. There is not enough information to determine which ports are in the blocking state.

9.單項選擇題Which statement is true about TCN propagation?()

A.The originator of the TCN immediately floods this information through the network.
B.The TCN propagation is a two step process.
C.A TCN is generated and sent to the root bridge.
D.The root bridge must flood this information throughout the network.

10.單項選擇題

Refer to the exhibit. Catalyst R is the root bridge for both VLAN 1 and VLAN 2.What is the easiest way to load-share traffic across both trunks and maintain redundancy in case a link fails,without using any type of EtherChannel link-bundling?()

A. Increase the root bridge priority (increasing the numerical priority number) for VLAN 2 on Catalyst D so that port D2 becomes the root port on Catalyst D for VLAN 2.
B. Decrease the port priority on R2 for VLAN 2 on Catalyst R so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1.
C. Decrease the path cost on R2 on Catalyst R for VLAN 2 so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1.
D. Increase the root bridge priority (decreasing the numerical priority number) for VLAN 2 on Catalyst R so that R2 becomes the root port on Catalyst D for VLAN 2.

最新試題

You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()

題型:單項選擇題

Which three options are valid ways to filter routes from a BGP peer?()

題型:多項選擇題

On the basis of the network provided in the exhibit, all routers are configured to run EIGRP on all links. If the link between PG-R1 and PG-R2 fails, what is the maximum number of queries PG-R3 will receive for 192.168.1.0/24, assuming that all the packets sent during convergence are transmitted once (there are no dropped or retransmitted packets)?()

題型:單項選擇題

Based on the exhibit presented. What will be the objective of this route map when applied to traffic passing through a router?()

題型:單項選擇題

What is true about Unicast RPF in strict mode?()

題型:單項選擇題

What is also called Type 0 authentication in OSPF on Cisco Routers?()

題型:單項選擇題

Based on the output provided in the exhibit, to which address or location will the router forward a packet sent to 192.168.32.1?()

題型:單項選擇題

Which two statements about SA caching are true?()

題型:多項選擇題

Which two EIGRP options will limit a query domain?()

題型:多項選擇題

In order to configure two routers as anycast RPs, which of these requirements, af a minimum, must besatisfied?()

題型:單項選擇題