网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
Which four Cisco Spanning Tree Protocol enhancements are supported with rapid per-VLAN Spanning-Tree plus?()
A
PortFast
B
UplinkFast
C
loop guard
D
root guard
E
BPDU guard
F
BackboneFast
参考答案
参考解析
解析:
暂无解析
更多 “多选题Which four Cisco Spanning Tree Protocol enhancements are supported with rapid per-VLAN Spanning-Tree plus?()APortFastBUplinkFastCloop guardDroot guardEBPDU guardFBackboneFast” 相关考题
考题
Catalyst 3500(Cisco.[OS系统)中配置PortFast生成树可选功能的命令格式是——。A.set spanning—tree portfastmod/portenableB.set spanning-tree portfastmod/portenableC.spanning—tree portfast defaultD.set spanning—tree portfastmod/portdefault
考题
Under which two circumstances should Spanning Tree Protocol be implemented?()
A. to ensure a loop-free topologyB. to protect against user-side loopsC. when a VLAN spans access layer switchesD. for the most deterministic and highly available network topologyE. because of the risk of lost connectivity without Spanning Tree Protocol
考题
Which four Cisco Spanning Tree Protocol enhancements are supported with rapid per-VLAN Spanning-Tree plus?()
A. PortFastB. UplinkFastC. loop guardD. root guardE. BPDU guardF. BackboneFast
考题
Which command enables RSTP on a switch?()
A. spanning-tree mode rapid-pvstB. spanning-tree uplinkfastC. spanning-tree backbonefastD. spanning-tree mode mst
考题
Which command enables RSTP on aswitch?()
A.spanning-tree mode rapid-pvstB.spanning-tree uplinkfastC.spanning-tree backbonefastD.spanning-tree mode mst
考题
Which four Cisco priority Spanning Tree Protocol enhancements are supported with rapid per-VLAN Spanning Tree? ()A、 PortFastB、 UplinkFastC、 loop guardD、 root guardE、 BPDU guardF、 BackboneFast
考题
Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A、802.1XB、Cisco Temporal Key Integrity Protocol (CKIP)C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)D、Cisco Message Integrity Check (CMIC)E、One-Time Passwords (OTP)F、Advanced Encryption Standard (AES)
考题
Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()A、Uplink FastB、Port FastC、BPDU GuardD、Root Guard
考题
What Cisco technology protects against Spanning-Tree Protocol manipulation?()A、 Spanning tree protectB、 Root Guard and BPDU GuardC、 Unicast Reverse Path ForwardingD、 MAC spoof guardE、 Port Security
考题
Which three of the following network features are methods used to achieve high availability()A、Spanning Tree Protocol(STP)B、Delay reductionC、Hot Standby Routing Protocol(HSRP)D、Dynamic routing protocolsE、Quality of Service(QoS)F、Jitter management
考题
Spanning Tree Protocol calculates path cost based on which of these? ()A、 interface bandwidthB、 interface delayC、 interface bandwidth and delayD、 hop countE、 bridge priority
考题
Which command enables RSTP on a switch?()A、spanning-tree mode rapid-pvstB、spanning-tree uplinkfastC、spanning-tree backbonefastD、spanning-tree mode mst
考题
Under which two circumstances should Spanning Tree Protocol be implemented? ()A、 to ensure a loop-free topologyB、 to protect against user-side loopsC、 when a VLAN spans access layer switchesD、 for the most deterministic and highly available network topologyE、 because of the risk of lost connectivity without Spanning Tree Protocol
考题
Which four Cisco Spanning Tree Protocol enhancements are supported with rapid per-VLAN Spanning-Tree plus?()A、PortFastB、UplinkFastC、loop guardD、root guardE、BPDU guardF、BackboneFast
考题
Which of the following specifications is a companion to the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) algorithm, and warrants the use multiple spanning-trees? ()A、 IEEE 802.1s (MST)B、 IEEE 802.1Q (CST)C、 Cisco PVST+D、 IEEE 802.1d (STP)E、 None of the other alternatives apply
考题
Which command enhances the 802.1D convergence time on ports that are connected to hosts?()A、spanning-tree backbonefastB、spanning-tree uplinkfastC、spanning-tree portfastD、spanning-tree cost512
考题
Which two statements about the various implementations of STP are true?()A、mon Spanning Tree maintains a separate spanning-tree instance for each VLAN configured in the network.B、The Spanning Tree Protocol (STP) is an evolution of the IEEE 802.1w standard.C、Per-VLAN Spanning Tree (PVST) supports 802.1Q trunking.D、Per-VLAN Spanning Tree Plus(PVST+) is an enhancement to 802.1Q specification and is supported only on Cisco devices.E、Rapid Spanning Tree Protocol (RSTP) includes features equivalent to Cisco PortFast, UplinkFast, and BackboneFast for faster network reconvergence.F、Multiple Spanning Tree (MST) assumes one spanning-tree instance for the entire Layer 2 network, regardless of the multiple number of VLANs
考题
多选题Which four Cisco priority Spanning Tree Protocol enhancements are supported with rapid per-VLAN Spanning Tree? ()APortFastBUplinkFastCloop guardDroot guardEBPDU guardFBackboneFast
考题
多选题Which two components should be part of a security implementation plan?()Adetailed list of personnel assigned to each task within the planBa Layer 2 spanning tree design topologyCrollback guidelinesDplacing all unused access ports in VLAN 1 to proactively manage port securityEenabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis
考题
单选题Spanning Tree Protocol calculates path cost based on which of these? ()A
interface bandwidthB
interface delayC
interface bandwidth and delayD
hop countE
bridge priority
考题
多选题Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)()。Aamount of RAMBbridge priorityCIOS versionDIP addressEMAC addressFspeed of the links
考题
多选题Under which two circumstances should Spanning Tree Protocol be implemented? ()Ato ensure a loop-free topologyBto protect against user-side loopsCwhen a VLAN spans access layer switchesDfor the most deterministic and highly available network topologyEbecause of the risk of lost connectivity without Spanning Tree Protocol
考题
多选题Which two values are used by Spanning Tree Protocol to elect a root bridge?()Aamount of RAMBbridge priorityCIOS versionDIP addressEMAC addressFspeed of the links
考题
单选题What Cisco technology protects against Spanning-Tree Protocol manipulation?()A
Spanning tree protectB
Root Guard and BPDU GuardC
Unicast Reverse Path ForwardingD
MAC spoof guardE
Port Security
考题
单选题Spanning Tree Protocol calculates path cost based on which of these?()A
interface bandwidthB
interface delayC
interface bandwidth and delayD
hop countE
bridge priority
考题
单选题Which of the following specifications is a companion to the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) algorithm, and warrants the use multiple spanning-trees? ()A
IEEE 802.1s (MST)B
IEEE 802.1Q (CST)C
Cisco PVST+D
IEEE 802.1d (STP)E
None of the other alternatives apply
热门标签
最新试卷