A.hello timer
B.BPDU timer
C.Forward_delay timer
D.Max_age timer
E.Dead timer
F.Wait timer
您可能感興趣的試卷
你可能感興趣的試題
Given the above diagram and assuming that STP is enabled on all switch devices, which twostatements are true?()
A.DSW11willbe elected the root bridge
B.DSW12 will be elected the root bridge
C.ASW13 will be elected the root bridge
D.P3/1 will be elected the nondesignated port
E.P2/2 will be elected the nondesignated port
F.P3/2 will be elected the nondesignated port
Exhibit:
Assuming that VLAN 1 and VLAN 2 traffic is enabled on the above network, what effect will thefollowing command have when entered on port 0/2 on switch SWA?()
spanning-tree vlan 1 port-priority 16
A.VLAN 1 traffic will be blocked on Switch SWB port 1/1
B.VLAN 2 traffic will be blocked on Switch SWB port 1/1
C.VLAN 2 traffic will be blocked on Switch SWA port 0/2
D.VLAN 1 and 2 traffic will be blocked on Switch SWA port 0/1
E.VLAN 1 and 2 traffic will be blocked on Switch SWA port 0/2
Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivitythroughout the network, Front Line users have been complaining that they experience slowernetwork performance when accessing the server farm than the Reception office experiences.Based on the exhibit, which two statements are true?()
A.Disabling the Spanning Tree Protocol would improve network performance
B.Changing the bridge priority of S1 to 36864 would improve network performance
C.Changing the bridge priority of S1 to 4096 would improve network performance
D.Changing the bridge priority of S3 to 4096 would improve network performance
E.Upgrading the link between S2 and S3 to Gigabit Ethernet would improve performance
F.Changing the bridge priority of S2 to 36864 would improve network performance
最新試題
Which three statements accurately describe IOS Firewall configurations?()
Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.
Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()
Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)
IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()
Refer to the exhibit. Which two statements about the AAA configuration are true?()
Study the exhibit carefully. The Cisco IOS IPsec High Availability (IPsec HA) Enhancementsfeature provides an infrastructure for reliable and secure networks to provide transparent availability of the VPN gateways - that is, Cisco IOS Software-based routers. What are the twooptions that are used to provide High Availability IPsec?()
Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.
Drag the DSL local loop topic on the left to the correct descriptions on the right.
Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()