單項(xiàng)選擇題Spanning Tree Protocol calculates path cost based on which of these? ()

A. interface bandwidth
B. interface delay
C. interface bandwidth and delay
D. hop count
E. bridge priority


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()

A. Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot
B. UDLD protects against STP failures caused by cabling problems that create one-way links.
C. Loop guard detects and protects against duplicate packets being received and transmitted on different ports
D. UDLD protects against unidirectional cabling problems on copper and fiber media.
E. Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

2.多項(xiàng)選擇題Which two options are contained in a VTP subset advertisement?()

A.followers field
B.MD5 digest
C.VLAN information
D.sequence number

3.單項(xiàng)選擇題

Refer to the exhibit. In the diagram,the switches are running IEEE 802.1w RSPT. On which ports should root guard be enabled in order to facilitate deterministic root bridge election under normal and failure scenarios?()

A. GE-3/1, GE-3/2
B. FE-2/1, FE-3/2
C. GE-1/1, GE-1/2
D. GE-4/1, GE-4/2
E. GE-2/1, GE-2/2
F. GE-3/1, GE-3/2, GE-4/1, GE-4/2, FE-2/1, FE-3/2

5.單項(xiàng)選擇題Which command is used to enable EtherChannel hashing for Layer 3 IP and Layer 4 port-based CEF?()

A.mpls ip cef
B.port-channel ip cef
C.mpls ip port-channel cef
D.port-channel load balance
E.mpls ip load-balance
F.ip cef EtherChannel channel-id XOR L4
G.ip cef connection exchange

最新試題

Which three options are valid ways to filter routes from a BGP peer?()

題型:多項(xiàng)選擇題

You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()

題型:單項(xiàng)選擇題

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()

題型:多項(xiàng)選擇題

Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()

題型:多項(xiàng)選擇題

Which two EIGRP options will limit a query domain?()

題型:多項(xiàng)選擇題

The classic Spanning Tree Protocol (802.1 D 1998) uses which sequence of variables to determine thebest received BPDU?()

題型:單項(xiàng)選擇題

What is true about Unicast RPF in strict mode?()

題型:單項(xiàng)選擇題

What is also called Type 0 authentication in OSPF on Cisco Routers?()

題型:單項(xiàng)選擇題

An expanding company is deploying leased lines between its main site and two remote sites. Thebandwidth of the leased lines is 128kb/s each,terminated on different serial interfaces on the main router.These links are used for combined VOIP and data traffic. The network administrator has implemented a VOIP solution to reduce costs,and has therefore reserved sufficient bandwidth in a low latency queue oneach interface for the VOIP traffic. Users now complain about bad voice quality although no drops areobserved in the low latency queue. What action will likely fix this problem?()

題型:單項(xiàng)選擇題

Which protocol and port have been assigned by IANA for RADIUS authentication?()

題型:單項(xiàng)選擇題