A.1) lowest root bridge id,2) lowest sender bridge id,3) lowest port id,4) lowest root path cost
B.1) lowest root path cost,2) lowest root bridge id,3) lowest sender bridge id,4) lowest sender port id
C.1) lowest root bridge id,2) lowest sender bridge id,3) lowest root path cost,4) lowest sender port id
D.1) lowest root bridge id,2) lowest root path cost,3) lowest sender bridge id,4) lowest sender port id
您可能感興趣的試卷
你可能感興趣的試題
A.VTP updates are ignored and forwarded out all ports.
B.VTP updates are ignored and forwarded out trunks only.
C.VTP updates are made to the VLAN database and are forwarded out trunks only.
D.VTP updates are ignored and are not forwarded.
A.8192
B.16384
C.49152
D.65535
A.Designated Root Cost
B.bridge ID priority
C.max age
D.bridge ID MAC address
E.Designated Root Priority
F.forward delay
A.one global STP instance for all VLANs
B.one STP instance for each VLAN
C.one STP instance per set of VLANs
D.one STP instance per set of bridges
A.Attempt to TELNET from the router connected to the inside of the firewall to the router connected to theoutside of the firewall. If telnet works, BGP will work, since telnet and BGP both use TCP to transportdata.
B.Ping from the router connected to the inside interface of the firewall to the router connected to theoutside interface of the firewall. If you can ping between them, BGP should work, since BGP uses IP totransport packets.
C.There is no way to make BGP work across a firewall without special configuration, so there is no simpletest that will show you if BGP will work or not, other than trying to start the peering session.
D.There is no way to make BGP work across a firewall.
最新試題
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()
Which three protocols or applications should be placed in a class that is configured with WRED?()
Spanning Tree Protocol IEEE 802.1 s defines the ability to deploy which of these?()
Which command is used to enable SSM with the range 232.0.0.0 - 255.0.0.0?()
All of these are fundamental building blocks of differentiated services Traffic Conditioner Block exceptwhich one?()
Which three message types are valid PIMv2 message types?()
An expanding company is deploying leased lines between its main site and two remote sites. Thebandwidth of the leased lines is 128kb/s each,terminated on different serial interfaces on the main router.These links are used for combined VOIP and data traffic. The network administrator has implemented a VOIP solution to reduce costs,and has therefore reserved sufficient bandwidth in a low latency queue oneach interface for the VOIP traffic. Users now complain about bad voice quality although no drops areobserved in the low latency queue. What action will likely fix this problem?()
Which of these statements about penultimate hop popping are true?()
Which two EIGRP options will limit a query domain?()
What is true about Unicast RPF in strict mode?()