單項選擇題You replaced your Layer 3 switch, which is the default gateway of the end users. Many users cannot access anything now, including email, Internet, and other applications, although other users do not have any issues. All of the applications are hosted in an outsourced data center. In order to fix the problem, which one of these actions should you take?()

A.Clear the MAC address table in the switch.
B.Clear the ARP cache in the switch.
C.Clear the ARP cache in the end devices.
D.Clear the ARP cache in the application servers.


您可能感興趣的試卷

你可能感興趣的試題

2.多項選擇題The network administrator is trying to add Switch1 to the network, but the 802.1Q trunk is not coming up. Switch1 was previously tested in the laboratory and its trunk configuration worked fine. What are three possible causes of this problem?()

A.The trunking configuration mode on Switch1 is set to Off.
B.The trunking configuration mode on the other end is set to On.
C.The trunking configuration mode on the other end is set to Desirable.
D.Cisco Discovery Protocol is not running on the other end.
E.There is a VTP domain name mismatch.
F.Switch1 does not support 802.1Q.

3.單項選擇題

Refer to the exhibit. When applying this policy map on the tunnel1 interface,you see packet loss for the TCP class starting at around 100000 b/s,instead of the configured 150000 b/s. What is the most likely?()

A.The violate-action command should not be configured.
B.The current configuration of the load-interval command on the tunnel interface is preventing proper policing calculations.
C.The burst size is too low.
D.Policing on tunnel interfaces is not supported.
E.The CIR keyword is missing in the policer.

4.單項選擇題You have done a partial migration from 802.1D STP to 802.1w STP. Which of the following is true?()

A.802.1D and 802.1w interoperate only when the 802.1D STP domain supports rapid convergence.
B.Ports leading to 802.1D devices will run in compatibility mode, while the rest of the ports will run in 802.1w mode.
C.This is an invalid configuration and a partial migration cannot be done.
D.The bridge timers will be set to match the 802.1D devices.
E.A secondary root bridge will always be populated within the 802.1D domain.
F.If the root bridge is selected within the 802.1D domain, the whole STP domain will run in 802.1D compatibility mode.
G.In partially migrated 802.1w networks, it is recommended to keep the STP diameter below 4.

6.單項選擇題You are about to migrate a customer network to use a VSS. Which of these statements is true about a VSS?()

A.The VSS switch must be the root bridge for all VLANs and is automatically designated.
B.The VSS switch is defined in RFC 4318 as a managed object.
C.The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devices.
D.A VSS interoperates with a virtual port channel.
E.The 802.1Q or ISL protocols are used to maintain the operational state of the VSS devices.
F.A VSS increases the size of the spanning-tree domain.

8.單項選擇題

Refer to the exhibit. When applying this hierarchical policy map on the on the tunnel1 interface, you measure high jitter for traffic going through class 1234. What is the most likely cause of this jitter?()

A.The configuration of a hierarchical policy map on a tunnel interface is not supported.
B.Class 5555 and class 5554 are both taking up 100% of the bandwidth,leaving nothing for class 1234.
C.The burst size for the traffic shaping is wrongly configured to 15000;this would require an interface capable of sending at 150Mb/s.
D.The burst size for the traffic shaping has been wrongly configured;it should be set as low as possible.
E.The burst size for the traffic shaping has been wrongly configured;it should be set as high as possible.

10.單項選擇題You are the network administrator of an enterprise with a main site and multiple remote sites. Your network carries both VOIP and data traffic. You agree with your service provider to classify VOIP and data traffic according to the different service RFCs. How can your data and VOIP traffic be marked?()

A.data marked with DSCP AF21,VOIP marked with DSCP EF
B.data marked with DSCP AF51,VOIP marked with DSCP EF
C.data marked with the DE-bit,VOIP marked with the CLP-bit
D.data marked with DSCP EF,VOIP marked with DSCP AF31
E.data marked with IP precedence 5 VOIP marked with DSCP EF