网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()
A

RIP

B

0S:F

C

STP

D

EGP


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A RIPB 0S:FC STPD EGP” 相关考题
考题 Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?() A.RIPB.0S:FC.STPD.EGP

考题 Which of the following actions will prevent a driver from being reinstalled automatically?() A. Run the disable command.B. Disable the device using Device Manager.C. Review manufacturer manual.D. Reboot the server, logon in Safe Mode, uninstall the driver.

考题 Which of the following protocols use both TCP and UDP ports?()A、FTPB、SMTPC、TelnetD、DNSE、All of the above

考题 Which of the following characteristics describe the BPDU Guard feature?(Choose all that apply.)()A、A BPDU Guard port should only be configured on ports with PortFast enabledB、BPDU Guard and PortFast should not be enabled on the same port.C、BPDU Guard is used to ensure that superior BPDUs are not received on a switch portD、A BPDU Guard port receiving a BPDU will go into err-disable stateE、A BPDU Guard port receiving a BPDU will be disabledF、BPDU Guard can be enabled on any switch port

考题 You are about to migrate a customer network to use a VSS. Which of these statements is true about a VSS? ()A、 The VSS switch must be the root bridge for all VLANs and is automatically designatedB、 The VSS switch is defined in RFC 4318 as a managed objectC、 The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devicesD、 A VSS interoperates with a virtual port channelE、 The 802.1Q or ISL protocols are used to maintain the operational state of the VSS devicesF、 A VSS increases the size of the spanning-tree domain

考题 Which of the following protocols uses both TCP and UDP ports?()A、SMTPB、TelnetC、FTPD、DNS

考题 You are implementing basic switch security best practices.  Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()A、Make all ports private VLAN ports.B、Place all unused ports in native VLAN 1 until needed.C、Proactively configure unused switch ports as access ports.D、Disable Cisco Discovery Protocol globally.

考题 Routing convergence time is which of the following?()A、Time required for a VPN connection to occurB、Time required by protocols to update their forwarding tables after changes have occurredC、Time required for an IDS to detect suspicious softwareD、Time required by switch ports to update their link status and transition to the forwarding state

考题 Which of the protocols below, operates at Layer 2 of the OSI model, and is used to maintain a loop-free network?()A、RIPB、STPC、IGRPD、CDPE、VTP

考题 Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A、RIPB、0S:FC、STPD、EGP

考题 Which of the following actions will prevent a driver from being reinstalled automatically?()A、Run the disable command.B、Disable the device using Device Manager.C、Review manufacturer manual.D、Reboot the server, logon in Safe Mode, uninstall the driver.

考题 An administrator is having a hard time adding a new switch to the network. After verifying that allthe ports are configured correctly on each switch, which of the following should the administratorverily NEXT?()A、Straight-through cable is used to connect both switchesB、Loopback plug is connectedC、Crossover cable is used to connect both switchesD、Cable is a rollover cable

考题 Which of the following routing protocols runs over UDP and determines path based upon distancevectors?()A、RIPB、DSIC、BGPD、IS-IS

考题 Which of the following are considered link state protocols?()A、RIPv2 and EIGRPB、EGP and IGPC、OSPF and IS-ISD、RIP and BGP

考题 单选题Routing convergence time is which of the following?()A Time required for a VPN connection to occurB Time required by protocols to update their forwarding tables after changes have occurredC Time required for an IDS to detect suspicious softwareD Time required by switch ports to update their link status and transition to the forwarding state

考题 多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP

考题 单选题Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A RIPB 0S:FC STPD EGP

考题 单选题Which of the following protocols should be used to monitor network performance?()A SNTPB SMTPC HTTPD SNMP

考题 单选题Which of the following protocols use both TCP and UDP ports?()A FTPB SMTPC TelnetD DNSE All of the above

考题 单选题Which of the following protocols is commonly used for VoIP technology?()A TelnetB SMTPC SIPD SNMP

考题 单选题Which one of the following protocols uses both UDP and TCP ports for the transport layer operation?()A FTPB TFTPC SMTPD TelnetE DNS

考题 单选题You are about to migrate a customer network to use a VSS. Which of these statements is true about a VSS? ()A  The VSS switch must be the root bridge for all VLANs and is automatically designatedB  The VSS switch is defined in RFC 4318 as a managed objectC  The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devicesD  A VSS interoperates with a virtual port channelE  The 802.1Q or ISL protocols are used to maintain the operational state of the VSS devicesF  A VSS increases the size of the spanning-tree domain

考题 单选题An administrator is having a hard time adding a new switch to the network. After verifying that allthe ports are configured correctly on each switch, which of the following should the administratorverily NEXT?()A Straight-through cable is used to connect both switchesB Loopback plug is connectedC Crossover cable is used to connect both switchesD Cable is a rollover cable

考题 单选题Which of the following actions will prevent a driver from being reinstalled automatically?()A Run the disable command.B Disable the device using Device Manager.C Review manufacturer manual.D Reboot the server, logon in Safe Mode, uninstall the driver.

考题 单选题Which of the following protocols is commonly used by ping?()A SIPB ICMPC TFTPD ARP

考题 单选题Which of the following actions will prevent a driver from being reinstalled automatically?()A  Run the disable command.B  Disable the device using Device Manager.C  Review manufacturer manual.D  Reboot the server, logon in Safe Mode, uninstall the driver.

考题 单选题Which of the following protocols uses both TCP and UDP ports?()A SMTPB TelnetC FTPD DNS

考题 单选题Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()A BridgeB FirewallC Port replicatorD Gateway