网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()
A
RIP
B
0S:F
C
STP
D
EGP
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A RIPB 0S:FC STPD EGP” 相关考题
考题
Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()
A.RIPB.0S:FC.STPD.EGP
考题
Which of the following actions will prevent a driver from being reinstalled automatically?()
A. Run the disable command.B. Disable the device using Device Manager.C. Review manufacturer manual.D. Reboot the server, logon in Safe Mode, uninstall the driver.
考题
Which of the following protocols use both TCP and UDP ports?()A、FTPB、SMTPC、TelnetD、DNSE、All of the above
考题
Which of the following characteristics describe the BPDU Guard feature?(Choose all that apply.)()A、A BPDU Guard port should only be configured on ports with PortFast enabledB、BPDU Guard and PortFast should not be enabled on the same port.C、BPDU Guard is used to ensure that superior BPDUs are not received on a switch portD、A BPDU Guard port receiving a BPDU will go into err-disable stateE、A BPDU Guard port receiving a BPDU will be disabledF、BPDU Guard can be enabled on any switch port
考题
You are about to migrate a customer network to use a VSS. Which of these statements is true about a VSS? ()A、 The VSS switch must be the root bridge for all VLANs and is automatically designatedB、 The VSS switch is defined in RFC 4318 as a managed objectC、 The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devicesD、 A VSS interoperates with a virtual port channelE、 The 802.1Q or ISL protocols are used to maintain the operational state of the VSS devicesF、 A VSS increases the size of the spanning-tree domain
考题
You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()A、Make all ports private VLAN ports.B、Place all unused ports in native VLAN 1 until needed.C、Proactively configure unused switch ports as access ports.D、Disable Cisco Discovery Protocol globally.
考题
Routing convergence time is which of the following?()A、Time required for a VPN connection to occurB、Time required by protocols to update their forwarding tables after changes have occurredC、Time required for an IDS to detect suspicious softwareD、Time required by switch ports to update their link status and transition to the forwarding state
考题
Which of the protocols below, operates at Layer 2 of the OSI model, and is used to maintain a loop-free network?()A、RIPB、STPC、IGRPD、CDPE、VTP
考题
Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A、RIPB、0S:FC、STPD、EGP
考题
Which of the following actions will prevent a driver from being reinstalled automatically?()A、Run the disable command.B、Disable the device using Device Manager.C、Review manufacturer manual.D、Reboot the server, logon in Safe Mode, uninstall the driver.
考题
An administrator is having a hard time adding a new switch to the network. After verifying that allthe ports are configured correctly on each switch, which of the following should the administratorverily NEXT?()A、Straight-through cable is used to connect both switchesB、Loopback plug is connectedC、Crossover cable is used to connect both switchesD、Cable is a rollover cable
考题
Which of the following routing protocols runs over UDP and determines path based upon distancevectors?()A、RIPB、DSIC、BGPD、IS-IS
考题
Which of the following are considered link state protocols?()A、RIPv2 and EIGRPB、EGP and IGPC、OSPF and IS-ISD、RIP and BGP
考题
单选题Routing convergence time is which of the following?()A
Time required for a VPN connection to occurB
Time required by protocols to update their forwarding tables after changes have occurredC
Time required for an IDS to detect suspicious softwareD
Time required by switch ports to update their link status and transition to the forwarding state
考题
多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP
考题
单选题Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A
RIPB
0S:FC
STPD
EGP
考题
单选题Which of the following protocols should be used to monitor network performance?()A
SNTPB
SMTPC
HTTPD
SNMP
考题
单选题Which of the following protocols use both TCP and UDP ports?()A
FTPB
SMTPC
TelnetD
DNSE
All of the above
考题
单选题Which of the following protocols is commonly used for VoIP technology?()A
TelnetB
SMTPC
SIPD
SNMP
考题
单选题Which one of the following protocols uses both UDP and TCP ports for the transport layer operation?()A
FTPB
TFTPC
SMTPD
TelnetE
DNS
考题
单选题You are about to migrate a customer network to use a VSS. Which of these statements is true about a VSS? ()A
The VSS switch must be the root bridge for all VLANs and is automatically designatedB
The VSS switch is defined in RFC 4318 as a managed objectC
The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devicesD
A VSS interoperates with a virtual port channelE
The 802.1Q or ISL protocols are used to maintain the operational state of the VSS devicesF
A VSS increases the size of the spanning-tree domain
考题
单选题An administrator is having a hard time adding a new switch to the network. After verifying that allthe ports are configured correctly on each switch, which of the following should the administratorverily NEXT?()A
Straight-through cable is used to connect both switchesB
Loopback plug is connectedC
Crossover cable is used to connect both switchesD
Cable is a rollover cable
考题
单选题Which of the following actions will prevent a driver from being reinstalled automatically?()A
Run the disable command.B
Disable the device using Device Manager.C
Review manufacturer manual.D
Reboot the server, logon in Safe Mode, uninstall the driver.
考题
单选题Which of the following actions will prevent a driver from being reinstalled automatically?()A
Run the disable command.B
Disable the device using Device Manager.C
Review manufacturer manual.D
Reboot the server, logon in Safe Mode, uninstall the driver.
考题
单选题Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()A
BridgeB
FirewallC
Port replicatorD
Gateway
热门标签
最新试卷