單項選擇題

Three Cisco Catalyst switches have been configured with a first-hop redundancy protocol. While reviewing some show commands, debug output, and the syslog, you discover the following information:

What conclusion can you infer from this information?()

A.VRRP is initializing and operating correctly.
B.HSRP is not properly exchanging three hello messages.
C.VRRP is not properly exchanging three hello messages.
D.HSRP is initializing and operating correctly.
E.GLBP is not properly exchanging three hello messages. 
F.GLBP is initializing and operating correctly.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題



You work as a network engineer for . You study the exhibit carefully. Three switches are configured for HSRP. Switch1 remains in the HSRP listen state. 
What is the most likely cause of this status?()

A.this is normal operation
B.IP addressing is incorrect
C.standby group number does not match VLAN number
D.incorrect standby timers
E.incorrect priority commands

3.單項選擇題

You work as a network engineer for . You study the exhibit carefully. From the configuration shown, 
what can be determined?()
Exhibit:

A.The remaining secure MAC addresses will be dynamically learned, converted to sticky secure MAC addresses, and added to the running configuration.
B.Since a voice VLAN is configured in this example, port security should be set for a maximum of 2.
C.The sticky addresses will only be those manually configured MAC addresses enabled with the sticky keyword.
D.A security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.

4.單項選擇題

When you enable port security on an interface that is also configured with a voice VLAN, 
what is the maximum number of secure MAC addresses that should be set on the port?()

A.No more than one secure MAC address should be set.
B.The default will be set.
C.The IP phone should use a dedicated port, therefore only one MAC address is needed per port.
D.No value is needed if the switchport priority extend command is configured. 
E.No more than two secure MAC addresses should be set.

5.單項選擇題When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()

A.protect (drop packets with unknown source addresses)
B.restrict (increment SecurityViolation counter)
C.shut down (access or trunk port)
D.transition (the access port to a trunking port)

最新試題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

題型:單項選擇題

Which two statements about the various implementations of STP are true?()

題型:多項選擇題

If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()

題型:單項選擇題

Refer to the exhibit. On the basis of the output of the show spanning-tree inconsistentports command, which statement about interfaces FastEthernet 0/1 and FastEthernet 0/2 is true?()

題型:單項選擇題

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()

題型:單項選擇題

DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()

題型:單項選擇題

Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()

題型:單項選擇題

Refer to the exhibit. Which statement is true about the output?()

題型:單項選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項選擇題

What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive a BPDU from its neighbor for three consecutive hello time intervals?()

題型:單項選擇題