多項選擇題Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard?()

A.alternate
B.backup
C.designated
D.disabled
E.root


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN?()

A.HDLC
B.Ethernet
C.Token Ring
D.PPP
E.FDDI
F.Frame Relay

2.多項選擇題A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?()

A. Erase flash.
B. Restart the switch.
C. Delete the VLAN database.
D. Erase the running configuration.
E. Erase the startup configuration.
F. Modify the configuration register.

4.多項選擇題What are two results of entering the Switch(config)# vtp mode client command on a Catalyst switch?()

A. The switch will ignore VTP summary advertisements.
B. The switch will forward VTP summary advertisements.
C. The switch will process VTP summary advertisements.
D. The switch will originate VTP summary advertisements.
E. The switch will create, modify and delete VLANs for the entire VTP domain.

5.多項選擇題What are three valid reasons to assign ports to VLANs on a switch?()

A. to make VTP easier to implement
B. to isolate broadcast traffic
C. to increase the size of the collision domain
D. to allow more devices to connect to the network
E. to logically group hosts according to function
F. to increase network security

7.多項選擇題What are the possible trunking modes for a switch port?()

A. transparent
B. auto
C. on
D. desirable
E. client
F. forwarding

8.多項選擇題What should be done prior to backing up an IOS image to a TFTP server?()

A. Make sure that the server can be reached across the network.
B. Check that authentication for TFTP access to the server is set.
C. Assure that the network server has adequate space for the IOS image.
D. Verify file naming and path requirements.
E. Make sure that the server can store binary files.
F. Adjust the TCP window size to speed up the transfer.

9.多項選擇題The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()

A. Switch1(config-if)# switchport port-security maximum 1
B. Switch1(config)# mac-address-table secure
C. Switch1(config)# access-list 10 permit ip host
D. Switch1(config-if)# switchport p ort-security violation shutdown
E. Switch1(config-if)# ip access-group 10

10.多項選擇題Which of the following describe private IP addresses?()

A. addresses chosen by a company to communicate with the Internet
B. addresses that cannot be routed through the public Internet
C. addresses that can be routed through the public Internet
D. a scheme to conserve public addresses
E. addresses licensed to enterprises or ISPs by an Internet registry organization

最新試題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項選擇題

If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()

題型:單項選擇題

Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()

題型:單項選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:單項選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項選擇題

What is the purpose of the cisco Vlan Trunking protocol?()

題型:單項選擇題

A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()

題型:單項選擇題

You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()

題型:單項選擇題

On which options are standard access list based?()

題型:單項選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項選擇題