A. to prevent routing loops
B. to create a default route
C. to provide multiple gateways for hosts
D. to maintain a loop-free Layer 2 network topology
E. to enhance the functions of SNMP
您可能感興趣的試卷
你可能感興趣的試題
A. defines how the media is accessed
B. supplies a token to determine which host has access to the media
C. defines the encoding of electrical signals on the wire
D. determines the preamble bits
A. path cost
B. lowest port MAC address
C. VTP revision number
D. highest port priority number
E. port priority number and MAC address
A. It is used with the OSPF priority values to determine which OSPF router will become the DR or BOR in a point-to-point network
B. It is used with the OSPF priority values to determine which interface will be used to form a neighbor relationship with another OSPF router
C. It is used with the OSPF priority values to determine which router will become the DR or BOR in a multi access network
D. It is used to determine which interfaces will send Hello packets to neighboring OSPF routers
A. Show vlan
B. Show mac-address-table
C. Show vtp status
D. show spanning-tree root
E. show ip interface brief
A. A configured router prompts for a password
B. A configured router goes to the privileged mode prompt
C. An un configured router goes into the setup dialog
D. An un configured router goes to the enable mode prompt
A. when all switches have the same BID as the root switch
B. when all switches have received the MAC address of each neighboring switch
C. when every enabled switch port has been assigned a unique identifier
D. when every operating switch port is in either the blocking or forwarding state
E. when all switches are in either client, server, or transparent mode
A. a serial cable with a V.35 to RJ45 adapter
B. a CSU/DSU
C. an external ISDN TA and NT1
D. The non-modular router cannot connect to an ISDN service. The network administrator must purchase a modular router with an ISDN BRI-U card.
A. a serial cable with a V.35 to RJ45 adapter
B. a CSU/DSU
C. an external ISDN TA and NT1
D. The non-modular router cannot connect to an ISDN service. The network administrator must purchase a modular router with an ISDN BRI-U card.
A. The switch will ignore VTP summary advertisements
B. The switch will forward VTP summary advertisements
C. The switch will process VTP summary advertisements
D. The switch will originate VTP summary advertisements
E. The switch will create, modify and delete VLANs for the entire VTP domain
A. Micro segmentation
B. Transparent switching
C. peer-to-peer networking
D. port security
E. store-and-forward switching
F. virtual local area networks
最新試題
What is the subnetwork address for a host with IP address 201.100.5.68/28?()
Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity?()
Which of the following statements regarding routed and routing protocols are true?()
What is a global command?()
TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()
The network 172.12.0.0 needs to be divided into subnets where each subnet has the capacity of 458 IP addresses.What would be the correct subnet mask to accomplish this division keeping the number of subnets at the maximum? ()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()
Which of the following correctly describe steps in the OSI data encapsulation process?()
Which characteristics are representative of a link-state routing protocol?()