Refer to the exhibit. Look at the command output. Assume that there is no other path, and the configuration is correct. What would be the consequences of this situation?()
A. Users in SW1 can ping SW2 but not vice versa.
B. Users in SW2 can ping SW1 but not vice versa.
C. Users in SW1 and SW2 can ping each other.
D. Users in SW1 and SW2 cannot ping each other.
您可能感興趣的試卷
你可能感興趣的試題
A.to prevent multicast packets from looping
B.to prevent PIM packets from looping
C.to instruct PIM where to send a (*, G) or (S, G) join message
D.to prevent multicast packets from looping and to instruct PIM where to send a (*, G) or (S, G) joinmessage
A.232.0.0.0/8
B.239.0.0.0/8
C.232.0.0.0/4
D.FF3x::/32
E.FF2x::/32
F.FF3x::/16
Refer to the exhibit. Look at the command output. What would be the most probable reason for this port-ID mismatch?()
A. spanning-tree misconfiguration
B. speed mismatch configuration
C. cabling problem
D. configuration problem
A.PIM-SM
B.PIM-DM
C.PIM-SSM
D.DVMRP
A. Incorrect VTP domain
B. Incorrect VTP password
C. Incorrect VTP mode
D. Incorrect VTP configuration revision
最新試題
Which message type is constructed and sent from an MSDP router to its MSDP peers when it receives a PIM register message knowing that the MSDP router is also configured as an RP for the PIM domain?()
Which two EIGRP options will limit a query domain?()
Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()
Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correctBGP session endpoint addresses and the correct BGP session hop-count limit EBGP multihop. What is agood first test to see if BGP will work across the firewall?()
Which two statements about SA caching are true?()
Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()
Which two statements are true about RED?()
Which of these statements about penultimate hop popping are true?()
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()
Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()