多項選擇題

Refer to the exhibit. Users from the Engineering VLAN complain that every time Business VLAN users have a network connectivity issue, the Engineering VLAN users usually have problems experiencing slow response or network connectivity problems. After troubleshooting, an unauthorized switch 2 was found. This unauthorized switch has been a regular problem, assuming the root bridge function under the spanning-tree domain and causing the 
Engineering VLAN to be unstable. Which three of these actions could be suggested to fix the problem?()

A. Upgrade Spanning Tree Protocol to Rapid Spanning Tree Protocol.
B. Change Business VLAN PCs to switch 1 and switch 4.
C. Force the root bridge to be switch 2, instead.
D. Adjust spanning-tree timers (max-age and forward-delay).
E. Shut down all unused ports.
F. Use MSTP to separate the Engineering VLAN from the Business VLAN to optimize spanning-tree convergence time within each VLAN


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題What is true about IP Source Guard with port security?()

A.Binding should be manually configured.
B.It is not supported if IEEE 802.1x port-based authentication is enabled.
C.The DHCP server must support option 82, or the client is not assigned an IP address.
D.It filters based on source IP address only.

2.單項選擇題

Refer to exhibits 1 and 2. In exhibit 1, all users on the LAN segment use router A as the active HSRP router. Router B is the standby router for the HSRP. In exhibit 2, the network management team reported that there is no utilization on the WAN link B. To solve this problem, you decide to change the logical topology of your LAN, but you are not sure about what changes must be made. You must manage HSRP or change it to another protocol in order to provide the most scalable design, automatic redundancy, and load balancing. Which one of these actions would be the best choice? ()

A. Use MHSRP, with three users using router A as the default gateway and three users using router B as the default gateway.
B. Keep HSRP and activate PBR to redirect half of the traffic to the other WAN link.
C. Use the backup interface on the WAN link B to provide load balancing for all users.
D. Use GLBP instead, because it provides you with up to three MAC addresses for the same default gateway virtual IP address.
E. Use GLBP instead, because it provides you with up to four MAC addresses for the same default gateway virtual IP address.

4.多項選擇題

Refer to the exhibit. The Layer 2 network uses VTP to manage its VLAN database. A network designer created all VLANs on the VTP server (switch 1) and it has been advertised through VTP to all other VTP clients (switches 2 through 4). Due to network growth, a network operator decided to add a new switch between switch 1 and switch 3. The network operator has been instructed to use a refurbished switch and use a VTP client. Which three of these factors should the network operator consider to minimize the impact of adding a new switch?()

A. Pay special attention to the VTP revision number, because the higher value takes the priority.
B. Configure all VLANs manually on the new switch in order to avoid connectivity issues.
C. A trunk should be established between the new switch and switches 1 and 3 as VTP only runs over trunk links.
D. Set at least the VTP domain name and password to get the new switch synchronized.
E. An ISL trunk should be established between the new switch and switches 1 and 3, because VTP only runs over ISL.
F. Pay special attention to the VTP revision number, because the lower value takes the priority.

5.多項選擇題Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()

A.It is used in multihome network scenarios.
B.It can be used with BGP to mitigate DoS and DDoS.
C.It does not need to have CEF enabled.
D.It is enabled via the interface level command ip verify unicast reverse-path.
E.It cannot be used with "classification" access lists.

6.單項選擇題What does Cisco recommend when you are enabling Cisco IOS IPS?()

A.Do not enable all the signatures at the same time.
B.Do not enable the ICMP signature.
C.Disable the Zone-Based Policy Firewall because it is not compatible with Cisco IOS IPS.
D.Disable CEF because it is not compatible with Cisco IOS IPS. .

7.多項選擇題Which three statements are true about TACACS+?()

A.It is a Cisco proprietary protocol.
B.It runs on TCP port 59. .
C.Authentication and authorization are done at different stages.
D.TACACS+ encrypts the entire body of the packet, but leaves a standard TACACS+ header.
E.It is an industry standard protocol.
F.TACACS+ encrypts both the entire body of the packet and the TACACS+ header.

8.單項選擇題What is Phantom RP used for?()

A.it is used for load balancing in bidirectional PIM
B.it is used for redundancy in bidirectional PIM
C.it is used for redundancy in PIM-SM
D.it is used for load balancing in PIM-SM

9.單項選擇題

Refer to the exhibit. Look at the command output. What can you use to prevent this behavior? ()

A. UDLD  (UniDirectional Link Detection)
B. spanning-tree loopguard
C. VTP mode transparent
D. switchport mode desirable

10.單項選擇題Which IGMPv2 message contains a non-zero "Max Response Time"?()

A.Membership Query
B.Membership Report
C.Membership Delay
D.Backward Compatible IGMPv1 Report Message

最新試題

Which two are differences between IGMPv2 and IGMPv3 reports?()

題型:多項選擇題

Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()

題型:單項選擇題

In GLBP,which router will answer on client ARP requests?()

題型:單項選擇題

What is the command to configure RSVP to reserve up to one-tenth of a Gigabit link,but only allow eachindividual flow to use 1 MB/s?()

題型:單項選擇題

How does an IPv6 router deal with a packet that is larger than the outgoing interface MTU?()

題型:單項選擇題

Which of these statements about penultimate hop popping are true?()

題型:多項選擇題

Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()

題型:多項選擇題

The classic Spanning Tree Protocol (802.1 D 1998) uses which sequence of variables to determine thebest received BPDU?()

題型:單項選擇題

Which two statements about SA caching are true?()

題型:多項選擇題

Choose two commands that are required to enable multicast on a router, when it is known that thereceivers use a specific functionality of IGMPv3.()

題型:多項選擇題