网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
The network administrator maps VLAN 10 through 20 to MST instance 2. How will this information be propagated to all appropriate switches?()
A
Information will be carried in the RSTP BPDUs.
B
It will be propagated in VTP updates.
C
Information stored in the Forwarding Information Base and the switch will reply on query.
D
Multiple Spanning Tree must be manually configured on the appropriate switches.
参考答案
参考解析
解析:
暂无解析
更多 “单选题The network administrator maps VLAN 10 through 20 to MST instance 2. How will this information be propagated to all appropriate switches?()A Information will be carried in the RSTP BPDUs.B It will be propagated in VTP updates.C Information stored in the Forwarding Information Base and the switch will reply on query. D Multiple Spanning Tree must be manually configured on the appropriate switches.” 相关考题
考题
The network administrator has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. The network administrator checks the port connecting the new switch to the core switch and sees the following information:Which of the following is the MOST likely cause of the slow connections?()A. The servers have not had VLAN tagging enabled on their NICs.B. Speed and duplex have not been set.C. VLAN tagging was not set on the trunk.D. The servers have been connected with CAT5 cable.
考题
A company is experiencing network delays. The network administrator discovers that a worker in a location far from the MDF has connected an old 10BASE-T switch with redundant links to the existing network.How could this action be responsible for the impaired network performance?()A. Connecting a host to the old switch has created a broadcast storm.B. The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.C. The old switch does not support VLANs, which has disabled the VLAN configuration of the entire the network.D. The old switch does not support full-duplex operation, effectively forcing half-duplex operation throughout the network.E. Spanning Tree Protocol has elected the old switch as the root bridge, creating inefficient data paths through the switched network.
考题
以下关于MSTP中MST Instance的说法正确的是?()A、VRP平台支持15个MST Instance,默认所有VLAN映射到MSTInstance 0。B、VRP平台支持15个MST Instance,默认所有VLAN映射到MSTInstance 1。C、VRP平台支持16个MST Instance,默认所有VLAN映射到MSTInstance 0。D、VRP平台支持16个MST Instance,默认所有VLAN映射到MSTInstance 1。
考题
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP
考题
In 802.1s, how is the VLAN to instance mapping represented in the BPDU?()A、The VLAN to instance mapping is a normal 16-byte field in the MST BPDU.B、The VLAN to instance mapping is a normal 12-byte field in the MST BPDU.C、The VLAN to instance mapping is a 16-byte MD5 signature field in the MST BPDU.D、The VLAN to instance mapping is a 12-byte MD5 signature field in the MST BPDU.
考题
The Company network utilizes the Multiple-instance Spanning Tree protocol in its switched LAN. Which three statements about the MST protocol (IEEE 802.1S) are true? ()A、 To verify the MST configuration, the show pending command can be used in MST configuration mode.B、 When RSTP and MSTP are configured; UplinkFast and BackboneFast must also be enabled.C、 All switches in the same MST region must have the same VLAN-to-instance mapping, but different configuration revision numbers.D、 All switches in an MST region, except distribution layer switches, should have their priority lowered from the default value 32768.E、 An MST region is a group of MST switches that appear as a single virtual bridge to adjacent CST and MST regions.F、 Enabling MST with the "spanning-tree modemst" global configuration command also enables RSTP.
考题
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
考题
MSTP中,MST配置表(MST Configuration Table)是MST配置标识(MST Configuration Identifier)的一部分,用于表示VLAN到MST Instance的映射关系。()
考题
以下关于MSTP中MST Instance和VLAN的映射关系的说法正确的是?()A、每个VLAN只能映射到一个MST Instance。B、每个MST Instance只能包含一个VLAN。C、每个MST Instance最多包含16个VLAN。D、每个VLAN可以映射到最多16个MST Instance。
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode
考题
The network administrator maps VLAN 10 through 20 to MST instance 2. How will this information be propagated to all appropriate switches?()A、 Information will be carried in the RSTP BPDUs.B、 It will be propagated in VTP updates.C、 Information stored in the Forwarding Information Base and the switch will reply on query. D、 Multiple Spanning Tree must be manually configured on the appropriate switches.
考题
While logged into a Company switch you issue the following command: CompanySwitch(config-mst)# instance 10 vlan 11-12 What does this command accomplish?()A、 It enables a PVST+ instance of 10 for vlan 11 and vlan 12B、 It enables vlan 11 and vlan 12 to be part of the MST region 10C、 It maps vlan 11 and vlan 12 to the MST instance of 10.D、 It creates an Internal Spanning Tree (IST) instance of 10 for vlan 11 and vlan 12 E、 It create a Common Spanning Tree (CST) instance of 10 for vlan 11 and vlan 12F、 It starts two instances of MST, one instance for vlan 11 and another instance for vlan 12.
考题
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
考题
You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining thataccess to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue,and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely thecause of this issue?()A、routing issueB、denial-of-service attackC、MAC floodingD、spanning-tree recalculationE、Layer 2 loopF、ARP spoofing attack
考题
Before inserting a new switch in the network,the network administrator checks that the VTP domain name is correct,the VTP mode is set to server, and revision is lower than the switches in the network. The administrator then configures interfaces and trunks,erases existing VLANs,and connects the switch to the network. Following that procedure,there is no connectivity in the network. What is a possible cause of this problem?()A、Because the configuration revision of the new switches is lower than the rest of the network, it can change the VLAN database of the other switches.B、As a VTP server, the new switch deleted all VLANs of the network.C、Erasing VLANs increases the VTP configuration revision.D、Since the configuration revision of the network is higher than the new switch, the VLAN database was automatically synchronized.
考题
What is true about access control on bridged and routed VLAN traffic? ()A、 Router ACLs can be applied to the input and output directions of a VLAN interface.B、 Bridged ACLs can be applied to the input and output directions of a VLAN interface.C、 Only router ACLs can be applied to a VLAN interface.D、 VLAN maps and router ACLs can be used in combination.E、 VLAN maps can be applied to a VLAN interface
考题
A network administrator is viewing the control plane traffic flowing through their network in real-time. What built-in feature enabled this ability?()A、call homeB、wiresharkC、ethanalyzerD、NX-OS
考题
What is true about access control on bridged and routed VLAN traffic?()A、Router ACLs can be applied to the input and output directions of a VLAN interfaceB、Bridged ACLs can be applied to the input and output directions of a VLAN interfaceC、Only router ACLs can be applied to a VLAN interfaceD、VLAN maps and router ACLs can be used in combinationE、VLAN maps can be applied to a VLAN interfac
考题
多选题What is true about access control on bridged and routed VLAN traffic?()ARouter ACLs can be applied to the input and output directions of a VLAN interfaceBBridged ACLs can be applied to the input and output directions of a VLAN interfaceCOnly router ACLs can be applied to a VLAN interfaceDVLAN maps and router ACLs can be used in combinationEVLAN maps can be applied to a VLAN interfac
考题
单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A
STPB
GVRPC
SNMPD
VTPE
DHCP
考题
多选题You are the network administrator tasked with designing a switching solution for the Company network. Which of the following statements describing trunk links are INCORRECT?()AThe trunk link belongs to a specific VLAN.BMultiple trunk links are used to connect multiple end user devices.CA trunk link only supports native VLAN.DTrunk links use 802.10 to identify a VLAN.EThe native VLAN of the trunk link is the VLAN that the trunk uses for untagged packets.
考题
单选题You are a network administrator of a large investor relations company that uses a switchednetwork to carry both data and IP telephony services. Why should you carry voice traffic on aseparate VLAN?()A
IP phones require inline power and must be in separate VLAN to receive inline powerB
IP telephony applications require prioritization over other traffic as they are more delaysensitiveC
IP phones can only receive IP addresses through DHCP if they are in separate VLAND
The CDP frames from the IP phone can only be recognized by the switch if the phone is in anauxiliary vlan
考题
多选题Your network contains a Hyper-V host named Host1 that runs Windows Server 2008 R2. The host is connected to VLAN ID 10. For testing purposes, you plan to deploy several virtual machines (VMs) on the Host1. You need to recommend which virtual networks must be created for the VMs. The solution must ensure that the VMs can only connect to other VMs. Which network configuration or configurations should you recommend?()Aan external network on VLAN ID 10Ban internal network on VLAN ID 11Can external network on VLAN ID 11Da private network on VLAN ID 10Ean internal network on VLAN ID 10
考题
单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A
BPDUB
Port securityC
RSTPD
STPE
VTPF
Blocking mode
考题
单选题In 802.1s, how is the VLAN to instance mapping represented in the BPDU?()A
The VLAN to instance mapping is a normal 16-byte field in the MST BPDU.B
The VLAN to instance mapping is a normal 12-byte field in the MST BPDU.C
The VLAN to instance mapping is a 16-byte MD5 signature field in the MST BPDU.D
The VLAN to instance mapping is a 12-byte MD5 signature field in the MST BPDU.
热门标签
最新试卷