單項選擇題

Refer to the exhibit. Look at the command output. Assume that there is no other path, and the configuration is correct. What would be the consequences of this situation?()

 

A. Users in SW1 can ping SW2 but not vice versa.
B. Users in SW2 can ping SW1 but not vice versa.
C. Users in SW1 and SW2 can ping each other.
D. Users in SW1 and SW2 cannot ping each other.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題How is RPF used in multicast routing?()

A.to prevent multicast packets from looping
B.to prevent PIM packets from looping
C.to instruct PIM where to send a (*, G) or (S, G) join message
D.to prevent multicast packets from looping and to instruct PIM where to send a (*, G) or (S, G) joinmessage

3.單項選擇題

Refer to the exhibit. Look at the command output. What would be the most probable reason for this port-ID mismatch?()

A. spanning-tree misconfiguration
B. speed mismatch configuration
C. cabling problem
D. configuration problem

最新試題

Which message type is constructed and sent from an MSDP router to its MSDP peers when it receives a PIM register message knowing that the MSDP router is also configured as an RP for the PIM domain?()

題型:單項選擇題

Which two EIGRP options will limit a query domain?()

題型:多項選擇題

Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()

題型:單項選擇題

Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correctBGP session endpoint addresses and the correct BGP session hop-count limit EBGP multihop. What is agood first test to see if BGP will work across the firewall?()

題型:單項選擇題

Which two statements about SA caching are true?()

題型:多項選擇題

Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()

題型:單項選擇題

Which two statements are true about RED?()

題型:多項選擇題

Which of these statements about penultimate hop popping are true?()

題型:多項選擇題

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()

題型:多項選擇題

Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()

題型:多項選擇題