网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which statement describes a spanning-tree network that has converged?()
A
All switch and bridge ports are in the forwarding state.
B
All switch and bridge ports are assigned as either root or designated ports.
C
All switch and bridge ports are in either the forwarding or blocking state.
D
All switch and bridge ports are either blocking or looping.
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which statement describes a spanning-tree network that has converged?()A All switch and bridge ports are in the forwarding state.B All switch and bridge ports are assigned as either root or designated ports.C All switch and bridge ports are in either the forwarding or blocking state.D All switch and bridge ports are either blocking or looping.” 相关考题
考题
The Ezonexam network administrator needs to verify that switch interface 0/5 has been assigned to the Marketing VLA.N. Which command will accomplish this task?A. Show vlanB. Show mac-address-tableC. Show vtp statusD. show spanning-tree rootE. show ip interface briefF. None of the above
考题
Which statement describes the primary difference between the WX and WXC platforms?()
A. The WX platform has built-in hard drives.B. The WXC platform has no built-in hard drives.C. The WX platform uses Network Sequence Caching technology.D. The WXC platform uses the Network Sequence Caching technology
考题
A network administrator needs to verify that switch interface 0/5 has been assigned to the Sales VLA.N. Which command will accomplish this task?()
A. Show vlanB. Show mac-address-tableC. Show vtp statusD. show spanning-tree rootE. show ip interface brief
考题
Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding state?()
A. redundantB. spannedC. provisionedD. converged
考题
A network administrator needs to verify that switch interface 0/5 has been assigned to the Sales VLA.N. Which command will accomplish this task?()A、Show vlanB、Show mac-address-tableC、Show vtp statusD、show spanning-tree rootE、show ip interface brief
考题
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard
考题
Which term describes a spanning-tree network that has all switch ports in either the blocking or forwardingstate? ()A、redundantB、spannedC、provisionedD、converged
考题
Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()A、The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch portB、The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.C、The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch portD、The default network setting is "HIGH"
考题
Which statement describes a spanning-tree network that has converged?()A、All switch and bridge ports are in the forwarding state.B、All switch and bridge ports are assigned as either root or designated ports.C、All switch and bridge ports are in either the forwarding or blocking state.D、All switch and bridge ports are either blocking or looping.
考题
A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()A、For the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.B、For the two vlans to communicate, a network statement for each subinterface needs to be added to the OSPF configuration.C、Direct inter-vlan communication does not require OSPFD、OSPF cannot be used if router-on-a-stick is configured on the router
考题
Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the path cost calculated?()A、number of hopsB、priority of the bridgeC、interface bandwidthD、interface delayE、None of the above
考题
As an experienced Network Engineer, you are required to implement the security architecture assessment. Which of the following statement describes the most important reason for that?()A、Create a design specification document.B、Integrate routing and switching components.C、Document power and UPS availabilityD、Document the customer's current and future technology projects.
考题
Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding state?()A、redundantB、spannedC、provisionedD、converged
考题
Which one of the statements below correctly describes the Virtual Router Redundancy Protocol (VRRP), which is being used in the Company network to provide redundancy?()A、 A VRRP group has one active and one or more standby virtual routers.B、 A VRRP group has one master and one or more backup virtual routers.C、 A VRRP group has one master and one redundant virtual router.D、 None of the other alternatives apply
考题
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard
考题
Which statement describes the primary difference between the WX and WXC platforms?()A、The WX platform has built-in hard drives.B、The WXC platform has no built-in hard drives.C、The WX platform uses Network Sequence Caching technology.D、The WXC platform uses the Network Sequence Caching technology
考题
Which statement accurately describes firewall user authentication?()A、Firewall user authentication provides another layer of security in a network.B、Firewall user authentication provides a means for accessing a JUNOS Software-based security device.C、Firewall user authentication enables session-based forwarding.D、Firewall user authentication is used as a last resort security method in a network.
考题
单选题Which statement describes the primary difference between the WX and WXC platforms?()A
The WX platform has built-in hard drives.B
The WXC platform has no built-in hard drives.C
The WX platform uses Network Sequence Caching technology.D
The WXC platform uses the Network Sequence Caching technology
考题
单选题A network administrator needs to verify that switch interface 0/5 has been assigned to the Sales VLA.N. Which command will accomplish this task?()A
Show vlanB
Show mac-address-tableC
Show vtp statusD
show spanning-tree rootE
show ip interface brief
考题
单选题Which statement accurately describes firewall user authentication?()A
Firewall user authentication provides another layer of security in a network.B
Firewall user authentication provides a means for accessing a JUNOS Software-based security device.C
Firewall user authentication enables session-based forwarding.D
Firewall user authentication is used as a last resort security method in a network.
考题
单选题Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the path cost calculated?()A
number of hopsB
priority of the bridgeC
interface bandwidthD
interface delayE
None of the above
考题
多选题Which of the following network topologies BEST describes a VPN? ()(Select TWO)APoint to PointBPoint to MultipointCVLANDRingEBus
考题
单选题Which one of the statements below correctly describes the Virtual Router Redundancy Protocol (VRRP), which is being used in the Company network to provide redundancy?()A
A VRRP group has one active and one or more standby virtual routers.B
A VRRP group has one master and one or more backup virtual routers.C
A VRRP group has one master and one redundant virtual router.D
None of the other alternatives apply
考题
单选题Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()A
The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch portB
The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.C
The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch portD
The default network setting is HIGH
考题
单选题A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()A
For the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.B
For the two vlans to communicate, a network statement for each subinterface needs to be added to the OSPF configuration.C
Direct inter-vlan communication does not require OSPFD
OSPF cannot be used if router-on-a-stick is configured on the router
考题
多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard
考题
单选题As an experienced Network Engineer, you are required to implement the security architecture assessment. Which of the following statement describes the most important reason for that?()A
Create a design specification document.B
Integrate routing and switching components.C
Document power and UPS availabilityD
Document the customer's current and future technology projects.
热门标签
最新试卷