Three Cisco Catalyst switches have been configured with a first-hop redundancy protocol. While reviewing some show commands, debug output, and the syslog, you discover the following information:
What conclusion can you infer from this information?()
A.VRRP is initializing and operating correctly.
B.HSRP is not properly exchanging three hello messages.
C.VRRP is not properly exchanging three hello messages.
D.HSRP is initializing and operating correctly.
E.GLBP is not properly exchanging three hello messages.
F.GLBP is initializing and operating correctly.
您可能感興趣的試卷
你可能感興趣的試題
You work as a network engineer for . You study the exhibit carefully. Three switches are configured for HSRP. Switch1 remains in the HSRP listen state.
What is the most likely cause of this status?()
A.this is normal operation
B.IP addressing is incorrect
C.standby group number does not match VLAN number
D.incorrect standby timers
E.incorrect priority commands
hostname Switch1
interface Vlan10
ip address 172.16.10.32 255.255.255.0
no ip redirects
standby 1 ip 172.16.10.110
standby 1 timers 1 5
standby 1 priority 130
hostname Switch2
interface Vlan10
ip address 172.16.10.33 255.255.255.0
no ip redirects
standby 1 ip 172.16.10.110
standby 1 timers 1 5
standby 1 priority 120
HSRP was implemented and configured on two switches while scheduled network maintenance was performed.
After the two switches have finished rebooting, you notice via show commands that Switch2 is the HSRP active router.
Which two items are most likely the cause of Switch1 not becoming the active router? ()
A.premption is disabled
B.standby group number does not match VLAN number
C.IP addressing is incorrect
D.IP redirect is disabled
E.incorrect standby timers
F.booting delays
You work as a network engineer for . You study the exhibit carefully. From the configuration shown,
what can be determined?()
Exhibit:
A.The remaining secure MAC addresses will be dynamically learned, converted to sticky secure MAC addresses, and added to the running configuration.
B.Since a voice VLAN is configured in this example, port security should be set for a maximum of 2.
C.The sticky addresses will only be those manually configured MAC addresses enabled with the sticky keyword.
D.A security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.
When you enable port security on an interface that is also configured with a voice VLAN,
what is the maximum number of secure MAC addresses that should be set on the port?()
A.No more than one secure MAC address should be set.
B.The default will be set.
C.The IP phone should use a dedicated port, therefore only one MAC address is needed per port.
D.No value is needed if the switchport priority extend command is configured.
E.No more than two secure MAC addresses should be set.
A.protect (drop packets with unknown source addresses)
B.restrict (increment SecurityViolation counter)
C.shut down (access or trunk port)
D.transition (the access port to a trunking port)
A.Test the design on a pilot network for expected results prior to implementing on the production network.
B.Run a network audit to determine types of traffic in use on the network.
C.Launch campus updates into the production network and monitor impact to see if configuration changes are needed.
D.Create an interruption of data flow to determine test "back-door" access methods.
A.a detailed physical and logical topology
B.a cost analysis of the implemented solution
C.detailed logs from the AAA and SNMP servers
D.results from audit testing of the implemented solution
A.having alternative addressing and VLAN schemes
B.having a rollback plan in case of unwanted or unexpected results
C.running a test script against all possible security threats to insure that the solution will mitigate all potential threats
D.isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system
A.a list of existing network applications currently in use on the network
B.network audit results to uncover any potential security holes
C.a planned Layer 2 design solution
D.a proof-of-concept plan
E.device configuration templates
A.detailed list of personnel assigned to each task within the plan
B.a Layer 2 spanning tree design topology
C.rollback guidelines
D.placing all unused access ports in VLAN 1 to proactively manage port security
E.enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis
最新試題
Which statement is correct about RSTP port roles?()
Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivity throughout the network, Front Line users have been complaining that they experience slower network performance when accessing the server farm than the Reception office experiences. Based on the exhibit, which two statements are true?()
Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()
Which statement is correct about the use of the virtual interface on a WLC ?()
During routine maintenance, G1/0/1 on DS1 was shutdown. All other interface were up. DS2 became the active HSRP device for Vlan101 as desired. However, after G1/0/1 on DS1 was reactivated. DS1 did not become the active HSRP device as desired. What need to be done to make the group for Vlan101 function properly ? ()
Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()
Refer to the exhibit. On the basis of the output of the show spanning-tree inconsistentports command, which statement about interfaces FastEthernet 0/1 and FastEthernet 0/2 is true?()
Refer to the exhibit and the partial configuration of switch SW_A and SW_B. STP is configured on all switches in the network. SW_B receives this error message on the console port:00:06:34: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on FastEthernet0/5 (not half duplex), with SW_A FastEthernet0/4 (half duplex) , with TBA05071417(Cat6K-B) 0/4 (half duplex). What would be the possible outcome of the problem?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
What is the configured priority value of the Vlan105’s group on DS2 ?()