單項(xiàng)選擇題You have done a partial migration from 802.1D STP to 802.1w STP. Which of the following is true?()

A.802.1D and 802.1w interoperate only when the 802.1D STP domain supports rapid convergence.
B.Ports leading to 802.1D devices will run in compatibility mode, while the rest of the ports will run in 802.1w mode.
C.This is an invalid configuration and a partial migration cannot be done.
D.The bridge timers will be set to match the 802.1D devices.
E.A secondary root bridge will always be populated within the 802.1D domain.
F.If the root bridge is selected within the 802.1D domain, the whole STP domain will run in 802.1D compatibility mode.
G.In partially migrated 802.1w networks, it is recommended to keep the STP diameter below 4.


您可能感興趣的試卷

你可能感興趣的試題

2.單項(xiàng)選擇題You are about to migrate a customer network to use a VSS. Which of these statements is true about a VSS?()

A.The VSS switch must be the root bridge for all VLANs and is automatically designated.
B.The VSS switch is defined in RFC 4318 as a managed object.
C.The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devices.
D.A VSS interoperates with a virtual port channel.
E.The 802.1Q or ISL protocols are used to maintain the operational state of the VSS devices.
F.A VSS increases the size of the spanning-tree domain.

4.單項(xiàng)選擇題

Refer to the exhibit. When applying this hierarchical policy map on the on the tunnel1 interface, you measure high jitter for traffic going through class 1234. What is the most likely cause of this jitter?()

A.The configuration of a hierarchical policy map on a tunnel interface is not supported.
B.Class 5555 and class 5554 are both taking up 100% of the bandwidth,leaving nothing for class 1234.
C.The burst size for the traffic shaping is wrongly configured to 15000;this would require an interface capable of sending at 150Mb/s.
D.The burst size for the traffic shaping has been wrongly configured;it should be set as low as possible.
E.The burst size for the traffic shaping has been wrongly configured;it should be set as high as possible.

6.單項(xiàng)選擇題You are the network administrator of an enterprise with a main site and multiple remote sites. Your network carries both VOIP and data traffic. You agree with your service provider to classify VOIP and data traffic according to the different service RFCs. How can your data and VOIP traffic be marked?()

A.data marked with DSCP AF21,VOIP marked with DSCP EF
B.data marked with DSCP AF51,VOIP marked with DSCP EF
C.data marked with the DE-bit,VOIP marked with the CLP-bit
D.data marked with DSCP EF,VOIP marked with DSCP AF31
E.data marked with IP precedence 5 VOIP marked with DSCP EF

7.單項(xiàng)選擇題An expanding company is deploying leased lines between its main site and two remote sites. The bandwidth of the leased lines is 128kb/s each,terminated on different serial interfaces on the main router. These links are used for combined VOIP and data traffic. The network administrator has implemented a VOIP solution to reduce costs,and has therefore reserved sufficient bandwidth in a low latency queue on each interface for the VOIP traffic. Users now complain about bad voice quality although no drops are observed in the low latency queue. What action will likely fix this problem?()

A.mark VOIP traffic with IP precedence 6 and configure only ’fair-queue’ on the links
B.configure the scheduler allocate 3000 1000 command to allow the QoS code to have enough CPU cycles
C.enable class-based traffic shaping on the VoIP traffic class
D.enable Layer 2 fragmentation and interleaving on the links
E.enable Frame Relay on the links and send voice and data on different Frame Relay PVCs

9.單項(xiàng)選擇題Which of these is a valid differentiated services PHB? ()

A.Guaranteed PHB
B.Class-Selector PHB
C.Reserved Forwarding PHB
D.Discard Eligible PHB
E.Priority PHB

10.多項(xiàng)選擇題Which two of these are differences between traffic policing and traffic shaping?()

A.with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available again
B.with policing you can tune the buffer usage for traffic exceeding the specified CIR
C.with shaping you can tune the buffer usage for traffic exceeding the specified CIR
D.shaping should only be applied for ingress traffic,policing only for egress
E.policing uses a token bucket algorithm,shaping uses an SPD algorithm