网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Why would an administrator change the value of the spanning-tree priority of a switch?()
A. in order to optimize the path that frames take from source to destination
B. to increase the priority so a designated port will become a root port
C. to increase the BID, so the switch is more likely to become root bridge
D. in order to allow VLANs to be sent from one switch to another across a single link
E. to force a given switch to become an STP server
参考答案
更多 “ Why would an administrator change the value of the spanning-tree priority of a switch?() A. in order to optimize the path that frames take from source to destinationB. to increase the priority so a designated port will become a root portC. to increase the BID, so the switch is more likely to become root bridgeD. in order to allow VLANs to be sent from one switch to another across a single linkE. to force a given switch to become an STP server ” 相关考题
考题
要将交换机100M端口的路径成本设置为25,以下哪个命令是正确的?()
A.Switch(config)#spanning-tree cost 25B.Switch(config-if)#spanning-tree cost 25C.Switch(config)#spanning-tree priority 25D.Switch(config-if)#spanning-tree path-cost 25
考题
What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?A. path costB. lowest port MAC addressC. VTP revision numberD. highest port priority numberE. port priority number and MAC addressF. None of the above
考题
The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above
考题
Why would the Ezonexam administrator change the value of the spanning-tree priority of a switch?A. in order to optimize the path that frames take from source to destinationB. to increase the priority so a designated port will become a root portC. to increase the BID, so the switch is more likely to become root bridgeD. in order to allow VLANs to be sent from one switch to another across a single linkE. to force a given switch to become an STP serverF. None of the above
考题
The OSPF process has been started and the networks have been configured for Area 0 as shown in the diagram. The network administrator has several options for configuring RouterB to ensure that it will be preferred as the designated router (DR) for the 172.16.1.0 /24 LAN segment. What configuration tasks could be used to establish this preference (Choose three.)()。A.Configure the priority value of the Fa0/0 interface of RouterB to a higher value than any other interface on the Ethernet network.B.Change the router id of Router B by assigning the IP address 172.16.1.130/24 to the Fa0/0 interface of RouterB.C.Configure a loopback interface on RouterB with an IP address higher than any IP address on the other routers.D.Change the priority value of the Fa0/0 interface of RouterB to zero.E.Change the priority values of the Fa0/0 interfaces of RouterA and RouterC to zero.F.No further configuration is necessary.
考题
Why would a network administrator configure port security on a switch()。
A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports
考题
What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、pathcost
考题
Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.
考题
A port in a redundant topology is currently in the blocking state and is not receiving BPDUs. To ensure that this port does not erroneously transition to the forwarding state, which command should be configured to satisfy the requirement?()A、Switch(config)#spanning-tree loopguard defaultB、Switch(config-if)#spanning-tree bdpufilterC、Switch(config)#udld aggressiveD、Switch(config-if)#spanning-tree bpduguard
考题
Which two statements are true when the extended system ID feature is enabled? ()A、The BID is made up of the bridge priority value(two bytes) and bridge MAC address (six bytes).B、The BID is made up of the bridge priority (four bits), the system ID (12 bits), and a bridge MAC address (48 bits).C、The BID is made up of the system ID (six bytes) and bridge priority value (two bytes).D、The system ID value is the VLAN ID (VID).E、The system ID value is a unique MAC address allocated from a pool of MAC addresses assigned to the switch or module.F、The system ID value is a hex number used to measure the preference of a bridge in the spanning-tree algorithm.
考题
Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports
考题
What are two things that an access point (AP) does when it receives an 802.11 frame from a Wi-Fi Multimedia (WMM) client? ()A、EAP-FASTEAP-FAS Access Point Protocol (LWAPP) packet is used to generate an 802.1 p priority value in the packets, which are sent to an Ethernet switch by the controllers.B、The AP will police the 802.1 le priority value to ensure it does not exceed the maximum value allowed for the QoS policy that is assigned to that client.C、Once the LWAPP packet is received, the AP generates the IEEE 802.1 p priority value.D、The AP will map the 802.11e priority value to the DSCP value.E、The AP will map the DSCP value to the outer LWAPP frame.
考题
The network administrator has enabled BPDU guard on the LAN. Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()A、BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. B、BPDU guard can guarantee proper selection of the root bridge.C、BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.D、BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.E、None of the other alternatives apply
考题
What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A、path costB、lowest port MAC addressC、VTP revision numberD、highest port priority numberE、port priority number and MAC address
考题
Why would an administrator change the value of the spanning-tree priority of a switch?()A、in order to optimize the path that frames take from source to destinationB、to increase the priority so a designated port will become a root portC、to increase the BID, so the switch is more likely to become root bridgeD、in order to allow VLANs to be sent from one switch to another across a single linkE、to force a given switch to become an STP server
考题
What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、path cost
考题
The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()A、Lower the bridge priority number.B、Change the MAC address of the switch.C、Increase the VTP revision number for the domain.D、Lower the root path cost on the switch ports.E、Assign the switch an IP address with the lowest value.
考题
单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()A
Lower the bridge priority number.B
Change the MAC address of the switch.C
Increase the VTP revision number for the domain.D
Lower the root path cost on the switch ports.E
Assign the switch an IP address with the lowest value.
考题
单选题Why would an administrator change the value of the spanning-tree priority of a switch?()A
in order to optimize the path that frames take from source to destinationB
to increase the priority so a designated port will become a root portC
to increase the BID, so the switch is more likely to become root bridgeD
in order to allow VLANs to be sent from one switch to another across a single linkE
to force a given switch to become an STP server
考题
单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A
lowest port MAC addressB
port priority number and MAC address.C
VTP revision numberD
highest port priority number.E
path cost
考题
单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()A
Lower the bridge priority number.B
Change the MAC address of the switch.C
Increase the VTP revision number for the domain.D
Lower the root path cost on the switch ports.E
Assign the switch an IP address with the lowest value.
考题
单选题What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A
path costB
lowest port MAC addressC
VTP revision numberD
highest port priority numberE
port priority number and MAC address
考题
单选题Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()A
switchport priority extend trustB
switchport priority extend cos 2C
switchport priority extend cos 11D
mls qos cos 2E
mls qos cos 2 override
考题
单选题Why would a network administrator configure port security on a switch()。A
to prevent unauthorized Telnet access to a switch portB
to limit the number of Layer 2 broadcasts on a particular switch portC
to prevent unauthorized hosts from accessing the LAND
to protect the IP and MAC address of the switch and associated portsE
to block unauthorized access to the switch management interfaces over common TCP ports
考题
单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()A
lowest port MAC addressB
port priority number and MAC address.C
VTP revision numberD
highest port priority number.E
pathcost
考题
单选题Why would a network administrator configure port security on a switch?()A
To prevent unauthorized Telnet access to a switch port.B
To limit the number of Layer 2 broadcasts on a particular switch port.C
To prevent unauthorized hosts from accessing the LAN.D
To protect the IP and MAC address of the switch and associated ports.E
To block unauthorized access to the switch management interfaces over common TCP ports.
考题
单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A
lowest port MAC addressB
port priority number and MAC addressC
VTP revision numberD
highest port priority numberE
path cost
考题
单选题The network administrator has enabled BPDU guard on the LAN. Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()A
BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. B
BPDU guard can guarantee proper selection of the root bridge.C
BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.D
BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.E
None of the other alternatives apply
热门标签
最新试卷