單項(xiàng)選擇題For the following ports, which port is on every bridge in a Spanning Tree Protocol IEEE 802.1w network except the root bridge?()

A.root port
B.backup port
C.designated port
D.alternate port


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題What are the "bound IP addresses" used for in LDP?()

A.For each such address and mask /32, one label binding is created.
B.As the TCP endpoint, IP addresses are used by the LDP session.
C.These addresses are used to find the label binding to put in the LFIB, by looking up these IP addresses in the routing table.
D.These addresses are used for penultimate hop popping (PHP) when forwarding packets to the next router directly. 

4.單項(xiàng)選擇題For the following protocols, which one provides a mechanism to transparently intercept and redirect CIFS traffic from a client to a local Cisco Wida Area Application engine?()

A.Virtual Router Redundancy Protocol(VRRP)
B.File Transport Protocol(FTP)
C.Hot Standby Routing Protocol(HSRP)
D.Web Cache Communication Protocol(WCCP)

6.單項(xiàng)選擇題Phase I and Phase II DMVPN differ in terms of which of these characteristics?()

A.Utilization of spoke-to-spoke dynamic tunnels
B.Utilization of multipoint GRE tunnels at the hub site
C.Utilization of hub-to-spoke dynamic tunnels
D.Support for multicast

7.單項(xiàng)選擇題Which one of the following potential issues is eliminated by using split horizon?()

A.Joined horizons
B.Packet forwarding loops
C.cisco Express Forwarding load-balancing inconsistency
D.Asymmetric routing throughout the network

9.單項(xiàng)選擇題f a Cisco switch is configured with VTPv1 in transparent mode, what is done with received VTP advertisements?()

A.They are discarded
B.The contents are altered to reflect the switch’s own VTP database and then they are forward out  all trunking ports
C.The changes within the advertisements are made to the switch’s VTP database.
D.The contents are ignored and they are forwarded out all trunking ports.

10.單項(xiàng)選擇題Which IOS security feature is configured by the ip inspect inspection-name {in | out} command?()

A.IPsec site-to-site VPN
B.Cisco AutoSecure
C.Cisco IOS Firewall
D.IPS

最新試題

Which IOS security feature is configured by the ip inspect inspection-name {in  out} command?()

題型:單項(xiàng)選擇題

Which statement best describes OSPF external LSAs (type 5)?()

題型:單項(xiàng)選擇題

Which two attributes need to match for two switches to become members of the same MST region?  ()

題型:多項(xiàng)選擇題

When two bridges are competing for the root bridge of an IEEE 802.1D spanning tree and both have the same bridge priority configured, which parameter determines the winner?()

題型:單項(xiàng)選擇題

Choose two commands that are required to enable multicast on a router, when it is known that the receivers use a specific functionality of IGMPv3.()

題型:多項(xiàng)選擇題

You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining that access to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue, and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely the cause of this issue?()

題型:單項(xiàng)選擇題

Which router is doing LSA type 7 to type 5 translation,and why?()

題型:單項(xiàng)選擇題

When a BGP router is not capable of understanding 4-byte AS numbers, it will see 4-byte AS numbers as a special, reserved, 2-byte AS number in the AS path. Which 2-byte AS number is this reserved one?()

題型:單項(xiàng)選擇題

Which three statements are true about policing? ()

題型:多項(xiàng)選擇題

Which message type is constructed and sent from an MSDP router to its MSDP peers when it  receives a PIM register message (knowing that the MSDP router is also configured as an RP for  the PIM domain)?()

題型:單項(xiàng)選擇題