网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

avoid Layer 2 loops. Which two of the following are most probably the reasons for that preference?()

  • A、Information about port roles is sent to all switches.
  • B、RSTPs that are based on Cisco products require no additional configuration.
  • C、Features such as UplinkFast and BackboneFast are compatible with RSTP.
  • D、An RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.

参考答案

更多 “avoid Layer 2 loops. Which two of the following are most probably the reasons for that preference?()A、Information about port roles is sent to all switches.B、RSTPs that are based on Cisco products require no additional configuration.C、Features such as UplinkFast and BackboneFast are compatible with RSTP.D、An RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.” 相关考题
考题 Regarding DHCP (dynamic host configuration protocol), which two of the following choices below are true? (Select two answer choices)A. The DHCP Discover message uses FF-FF-FF-FF-FF as the Layer 2 destination address.B. The DHCP Discover message uses UDP as the transport layer protocol.C. The DHCP Discover message uses a special Layer 2 multicast address as the destination address.D. The DHCP Discover message uses TCP as the transport layer protocol.E. The DHCP Discover message does not use a Layer 2 destination address.F. The DHCP Discover message does not require a transport layer protocol.

考题 Which two of these are characteristics of MPLS VPNs?() A. Layer 3 MPLS VPNs can forward only IP packetsB. Layer 2 MPLS VPNs can forward any network protocolC. MPLS label paths are automatically formed based on Layer 2 framesD. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 framesE. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

考题 Which two practices will avoid Cisco Express Forwarding polarization?() A. The core layer should use default Layer 3 hash information.B. The core layer should use default Layer 4 hash information.C. The distribution layer should use default Layer 3 hash information.D. The distribution layer should use default Layer 4 hash information.E. The core layer should use Layer 3 and Layer 4 information as input to the Cisco Expressing Forwarding hashing algorithm.F. The distribution layer should use Layer 3 and Layer 4 information as input into the Cisco Expressing Forwarding hashing algorithm.

考题 Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?() A. Layer 1intercontroller roamingB. Layer 2intercontroller roamingC. Layer 3intercontroller roamingD. Layer 4intercontroller roaming

考题 To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()A、 to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 linkB、 to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 linkC、 to two core switches from redundant distribution switches connected with Layer 2 linkD、 to two core switches from redundant distribution switches connected with Layer 3 linkE、 to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO

考题 Which two options can be used as traffic descriptors when classifying and marking traffic? ()A、incoming interfaceB、Layer 2 differentiated services code point (DSCP)C、Layer 3 IP precedenceD、outgoing interface

考题 Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?()A、Layer 1intercontroller roamingB、Layer 2intercontroller roamingC、Layer 3intercontroller roamingD、Layer 4intercontroller roaming

考题 Which two statements are correct about Layer 2 broadcast frames?()A、Layer 2 broadcast frames are processed by all devices on the same VLANB、Layer 2 broadcast frames are are discarded by routers that connect to multiple VLANsC、Layer 2 broadcast frames are relayerd by routers to all connected VLANsD、Layer 2 broadcast frames are relayed by switches to devices on the same VLAN

考题 Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network?()A、802.1dB、VTPC、802.1qD、STPE、SAP

考题 Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()A、 Layer 1 intercontroller roamingB、 Layer 2 intercontroller roamingC、 Layer 3 intercontroller roamingD、 intracontroller roaming

考题 Layer 3 (the network layer) provides connectivity and path selection between two host systems that may be located on geographically separated networks. Which two devices operate at the network layer?()A、 applicationB、 hubC、 switchD、 bridgeE、 router

考题 Which two of these are characteristics of MPLS VPNs? ()A、 Layer 3 MPLS VPNs can forward only IP packetsB、 Layer 2 MPLS VPNs can forward any network protocolC、 MPL S label paths are automatically formed based on Layer 2 framesD、 Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 framesE、 In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

考题 Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()A、Troubleshooting is more complicated.B、Service and switch modules are underutilized.C、Layer 2 adjacency is required with the servers that use this design.D、Layer 3 adjacency is required with the servers that use this design.E、Load balancing will always occur across both access layer uplinks.

考题 Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?()A、 Layer 1 intercontroller roamingB、 Layer 2 intercontroller roamingC、 Layer 3 intercontroller roamingD、 Layer 4 intercontroller roaming

考题 In which two locations in an enterprise network can an IPS sensor be placed? ()A、 bridging VLANs on two switchesB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunkingE、 between a Layer 2 device and a Layer 3 device with trunking

考题 Which two statements about VPLS are true? ()A、There is a full mesh of pseudowires.B、There is a partial mesh of pseudowires.C、Only L2TPv3 can be used for pseudowire establishment.D、There is split-horizon to avoid loops.

考题 单选题Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()A  Layer 1 intercontroller roamingB  Layer 2 intercontroller roamingC  Layer 3 intercontroller roamingD  intracontroller roaming

考题 单选题Layer 3 (the network layer) provides connectivity and path selection between two host systems that may be located on geographically separated networks. Which two devices operate at the network layer?()A  applicationB  hubC  switchD  bridgeE  router

考题 单选题Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?()A  Layer 1 intercontroller roamingB  Layer 2 intercontroller roamingC  Layer 3 intercontroller roamingD  Layer 4 intercontroller roaming

考题 多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunkingEbetween a Layer 2 device and a Layer 3 device withtrunking

考题 多选题avoid Layer 2 loops. Which two of the following are most probably the reasons for that preference?()AInformation about port roles is sent to all switches.BRSTPs that are based on Cisco products require no additional configuration.CFeatures such as UplinkFast and BackboneFast are compatible with RSTP.DAn RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.

考题 多选题Which two statements about VPLS are true? ()AThere is a full mesh of pseudowires.BThere is a partial mesh of pseudowires.COnly L2TPv3 can be used for pseudowire establishment.DThere is split-horizon to avoid loops.

考题 多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices with trunkingDbetween two Layer 2 devices without trunkingEbetween a Layer 2 device and a Layer 3 device with trunking

考题 多选题Which two of these are characteristics of MPLS VPNs?()ALayer 3 MPLS VPNs can forward only IP packetsBLayer 2 MPLS VPNs can forward any network protocolCMPLS label paths are automatically formed based on Layer 2 framesDLayer 3 MPLS VPNs can forward any network protocol based on Layer 2 framesEIn Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

考题 单选题To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()A  to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 linkB  to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 linkC  to two core switches from redundant distribution switches connected with Layer 2 linkD  to two core switches from redundant distribution switches connected with Layer 3 linkE  to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO

考题 单选题Which of these technologies is characterized as being a multipoint Layer 2 VPN that connects two or more customer devices using Ethernet bridging techniques?()A DPTB MPLSC VPLSD CWDME DWDMF SONET/SDH

考题 多选题Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network?()A802.1dBVTPC802.1qDSTPESAP

考题 多选题Which of the following are associated with the application layer of the OSI model?(two.)()ApingBTelnetCFTPDTCPEIP