單項選擇題Spanning Tree Protocol calculates path cost based on which of these? ()

A. interface bandwidth
B. interface delay
C. interface bandwidth and delay
D. hop count
E. bridge priority


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()

A. Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot
B. UDLD protects against STP failures caused by cabling problems that create one-way links.
C. Loop guard detects and protects against duplicate packets being received and transmitted on different ports
D. UDLD protects against unidirectional cabling problems on copper and fiber media.
E. Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

2.多項選擇題Which two options are contained in a VTP subset advertisement?()

A.followers field
B.MD5 digest
C.VLAN information
D.sequence number

3.單項選擇題

Refer to the exhibit. In the diagram,the switches are running IEEE 802.1w RSPT. On which ports should root guard be enabled in order to facilitate deterministic root bridge election under normal and failure scenarios?()

A. GE-3/1, GE-3/2
B. FE-2/1, FE-3/2
C. GE-1/1, GE-1/2
D. GE-4/1, GE-4/2
E. GE-2/1, GE-2/2
F. GE-3/1, GE-3/2, GE-4/1, GE-4/2, FE-2/1, FE-3/2

5.單項選擇題Which command is used to enable EtherChannel hashing for Layer 3 IP and Layer 4 port-based CEF?()

A.mpls ip cef
B.port-channel ip cef
C.mpls ip port-channel cef
D.port-channel load balance
E.mpls ip load-balance
F.ip cef EtherChannel channel-id XOR L4
G.ip cef connection exchange

最新試題

All of these are fundamental building blocks of differentiated services Traffic Conditioner Block exceptwhich one?()

題型:單項選擇題

In order to configure two routers as anycast RPs, which of these requirements, af a minimum, must besatisfied?()

題型:單項選擇題

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()

題型:多項選擇題

The classic Spanning Tree Protocol (802.1 D 1998) uses which sequence of variables to determine thebest received BPDU?()

題型:單項選擇題

What is true about Unicast RPF in strict mode?()

題型:單項選擇題

Which protocol and port have been assigned by IANA for RADIUS authentication?()

題型:單項選擇題

Spanning Tree Protocol IEEE 802.1 s defines the ability to deploy which of these?()

題型:單項選擇題

Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()

題型:單項選擇題

What is the correct command to set the router ID for an OSPFv3 process?()

題型:單項選擇題

You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()

題型:單項選擇題