网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Why would an administrator change the value of the spanning-tree priority of a switch?()

A. in order to optimize the path that frames take from source to destination

B. to increase the priority so a designated port will become a root port

C. to increase the BID, so the switch is more likely to become root bridge

D. in order to allow VLANs to be sent from one switch to another across a single link

E. to force a given switch to become an STP server


参考答案

更多 “ Why would an administrator change the value of the spanning-tree priority of a switch?() A. in order to optimize the path that frames take from source to destinationB. to increase the priority so a designated port will become a root portC. to increase the BID, so the switch is more likely to become root bridgeD. in order to allow VLANs to be sent from one switch to another across a single linkE. to force a given switch to become an STP server ” 相关考题
考题 要将交换机100M端口的路径成本设置为25,以下哪个命令是正确的?() A.Switch(config)#spanning-tree cost 25B.Switch(config-if)#spanning-tree cost 25C.Switch(config)#spanning-tree priority 25D.Switch(config-if)#spanning-tree path-cost 25

考题 What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?A. path costB. lowest port MAC addressC. VTP revision numberD. highest port priority numberE. port priority number and MAC addressF. None of the above

考题 The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

考题 Why would the Ezonexam administrator change the value of the spanning-tree priority of a switch?A. in order to optimize the path that frames take from source to destinationB. to increase the priority so a designated port will become a root portC. to increase the BID, so the switch is more likely to become root bridgeD. in order to allow VLANs to be sent from one switch to another across a single linkE. to force a given switch to become an STP serverF. None of the above

考题 The OSPF process has been started and the networks have been configured for Area 0 as shown in the diagram. The network administrator has several options for configuring RouterB to ensure that it will be preferred as the designated router (DR) for the 172.16.1.0 /24 LAN segment. What configuration tasks could be used to establish this preference (Choose three.)()。A.Configure the priority value of the Fa0/0 interface of RouterB to a higher value than any other interface on the Ethernet network.B.Change the router id of Router B by assigning the IP address 172.16.1.130/24 to the Fa0/0 interface of RouterB.C.Configure a loopback interface on RouterB with an IP address higher than any IP address on the other routers.D.Change the priority value of the Fa0/0 interface of RouterB to zero.E.Change the priority values of the Fa0/0 interfaces of RouterA and RouterC to zero.F.No further configuration is necessary.

考题 Why would a network administrator configure port security on a switch()。 A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports

考题 What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、pathcost

考题 Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.

考题 A port in a redundant topology is currently in the blocking state and is not receiving BPDUs. To ensure that this port does not erroneously transition to the forwarding state,  which command should be configured to satisfy the requirement?()A、Switch(config)#spanning-tree loopguard defaultB、Switch(config-if)#spanning-tree bdpufilterC、Switch(config)#udld aggressiveD、Switch(config-if)#spanning-tree bpduguard

考题 Which two statements are true when the extended system ID feature is enabled? ()A、The BID is made up of the bridge priority value(two bytes) and bridge MAC address (six bytes).B、The BID is made up of the bridge priority (four bits), the system ID (12 bits), and a bridge MAC address (48 bits).C、The BID is made up of the system ID (six bytes) and bridge priority value (two bytes).D、The system ID value is the VLAN ID (VID).E、The system ID value is a unique MAC address allocated from a pool of MAC addresses assigned to the switch or module.F、The system ID value is a hex number used to measure the preference of a bridge in the spanning-tree algorithm.

考题 Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

考题 What are two things that an access point (AP) does when it receives an 802.11 frame from a Wi-Fi Multimedia (WMM) client? ()A、EAP-FASTEAP-FAS Access Point Protocol (LWAPP) packet is used to generate an 802.1 p priority value in the packets, which are sent to an Ethernet switch by the controllers.B、The AP will police the 802.1 le priority value to ensure it does not exceed the maximum value allowed for the QoS policy that is assigned to that client.C、Once the LWAPP packet is received, the AP generates the IEEE 802.1 p priority value.D、The AP will map the 802.11e priority value to the DSCP value.E、The AP will map the DSCP value to the outer LWAPP frame.

考题 The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()A、BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. B、BPDU guard can guarantee proper selection of the root bridge.C、BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.D、BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.E、None of the other alternatives apply

考题 What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A、path costB、lowest port MAC addressC、VTP revision numberD、highest port priority numberE、port priority number and MAC address

考题 Why would an administrator change the value of the spanning-tree priority of a switch?()A、in order to optimize the path that frames take from source to destinationB、to increase the priority so a designated port will become a root portC、to increase the BID, so the switch is more likely to become root bridgeD、in order to allow VLANs to be sent from one switch to another across a single linkE、to force a given switch to become an STP server

考题 What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、path cost

考题 The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()A、Lower the bridge priority number.B、Change the MAC address of the switch.C、Increase the VTP revision number for the domain.D、Lower the root path cost on the switch ports.E、Assign the switch an IP address with the lowest value.

考题 单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()A Lower the bridge priority number.B Change the MAC address of the switch.C Increase the VTP revision number for the domain.D Lower the root path cost on the switch ports.E Assign the switch an IP address with the lowest value.

考题 单选题Why would an administrator change the value of the spanning-tree priority of a switch?()A in order to optimize the path that frames take from source to destinationB to increase the priority so a designated port will become a root portC to increase the BID, so the switch is more likely to become root bridgeD in order to allow VLANs to be sent from one switch to another across a single linkE to force a given switch to become an STP server

考题 单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A lowest port MAC addressB port priority number and MAC address.C VTP revision numberD highest port priority number.E path cost

考题 单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()A  Lower the bridge priority number.B  Change the MAC address of the switch.C  Increase the VTP revision number for the domain.D  Lower the root path cost on the switch ports.E  Assign the switch an IP address with the lowest value.

考题 单选题What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A path costB lowest port MAC addressC VTP revision numberD highest port priority numberE port priority number and MAC address

考题 单选题Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()A switchport priority extend trustB switchport priority extend cos 2C switchport priority extend cos 11D mls qos cos 2E mls qos cos 2 override

考题 单选题Why would a network administrator configure port security on a switch()。A to prevent unauthorized Telnet access to a switch portB to limit the number of Layer 2 broadcasts on a particular switch portC to prevent unauthorized hosts from accessing the LAND to protect the IP and MAC address of the switch and associated portsE to block unauthorized access to the switch management interfaces over common TCP ports

考题 单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()A lowest port MAC addressB port priority number and MAC address.C VTP revision numberD highest port priority number.E pathcost

考题 单选题Why would a network administrator configure port security on a switch?()A To prevent unauthorized Telnet access to a switch port.B To limit the number of Layer 2 broadcasts on a particular switch port.C To prevent unauthorized hosts from accessing the LAN.D To protect the IP and MAC address of the switch and associated ports.E To block unauthorized access to the switch management interfaces over common TCP ports.

考题 单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A lowest port MAC addressB port priority number and MAC addressC VTP revision numberD highest port priority numberE path cost

考题 单选题The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()A BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. B BPDU guard can guarantee proper selection of the root bridge.C BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.D BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.E None of the other alternatives apply