单项选择题Which statement is true about TCN propagation?()

A.The originator of the TCN immediately floods this information through the network.
B.The TCN propagation is a two step process.
C.A TCN is generated and sent to the root bridge.
D.The root bridge must flood this information throughout the network.


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题

Refer to the exhibit. Catalyst R is the root bridge for both VLAN 1 and VLAN 2.What is the easiest way to load-share traffic across both trunks and maintain redundancy in case a link fails,without using any type of EtherChannel link-bundling?()

A. Increase the root bridge priority (increasing the numerical priority number) for VLAN 2 on Catalyst D so that port D2 becomes the root port on Catalyst D for VLAN 2.
B. Decrease the port priority on R2 for VLAN 2 on Catalyst R so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1.
C. Decrease the path cost on R2 on Catalyst R for VLAN 2 so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1.
D. Increase the root bridge priority (decreasing the numerical priority number) for VLAN 2 on Catalyst R so that R2 becomes the root port on Catalyst D for VLAN 2.

2.单项选择题Which statement is true about loop guard?()

A.Loop guard only operates on interfaces that are considered point-to-point by the spanning tree.
B.Loop guard only operates on root ports.
C.Loop guard only operates on designated ports.
D.Loop guard only operates on edge ports.

3.单项选择题Why would a rogue host that is running a DHCP server on a campus LAN network present a security risk?()

A.It may allocate IP addresses from an unknown subnet to the users.
B.All multicast traffic can be sniffed by using the DHCP multicast capabilities.
C.The CPU utilization of the first hop router can be overloaded by exploiting DHCP relay open ports.
D.A potential man-in-the-middle attack can be used against the clients.

4.单项选择题The classic Spanning Tree Protocol (802.1D 1998) uses which sequence of variables to determine the best received BPDU?()

A. 1) lowest root bridge id,2)lowest sender bridge id,3)lowest port id,4)lowest root path cost
B. 1) lowest root path cost,2)lowest root bridge id,3)lowest sender bridge id,4)lowest sender port id
C. 1) lowest root bridge id,2)lowest sender bridge id,3)lowest root path cost 4)owest sender port id
D. 1) lowest root bridge id,2)lowest root path cost,3)lowest sender bridge id,4)lowest sender port id

5.单项选择题Which of these best describes the actions taken when a VTP message is received on a switch configured with the VTP mode "transparent"? ()

A. VTP updates are ignored and forwarded out all ports.
B. VTP updates are ignored and forwarded out trunks only.
C. VTP updates are made to the VLAN database and are forwarded out trunks only.
D. VTP updates are ignored and are not forwarded.

7.单项选择题What is the purpose of the STP PortFast BPDU guard feature? ()

A.enforce the placement of the root bridge in the network
B.ensure that a port is transitioned to a forwarding state quickly if a BPDU is received
C.enforce the borders of an STP domain
D.ensure that any BPDUs received are forwarded into the STP domain

8.多项选择题Which two commands are required to enable multicast on a router, knowing that the receivers only support IGMPv2?()

A.ip pim rp-address
B.ip pim ssm
C.ip pim sparse-mode
D.ip pim passive

9.多项选择题Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree Protocol IEEE 802.1D?()

A. Designated Root Cost
B. bridge ID priority
C. max age
D. bridge ID MAC address
E. Designated Root Priority
F. forward delay

10.单项选择题Spanning Tree Protocol IEEE 802.1s defines the ability to deploy which of these?()

A. one global STP instance for all VLANs
B. one STP instance for each VLAN
C. one STP instance per set of VLANs
D. one STP instance per set of bridges

最新试题

What is the correct command to set the router ID for an OSPFv3 process?()

题型:单项选择题

Which three options are valid ways to filter routes from a BGP peer?()

题型:多项选择题

Which three protocols or applications should be placed in a class that is configured with WRED?()

题型:多项选择题

What is also called Type 0 authentication in OSPF on Cisco Routers?()

题型:单项选择题

On the basis of the network provided in the exhibit, all routers are configured to run EIGRP on all links. If the link between PG-R1 and PG-R2 fails, what is the maximum number of queries PG-R3 will receive for 192.168.1.0/24, assuming that all the packets sent during convergence are transmitted once (there are no dropped or retransmitted packets)?()

题型:单项选择题

Choose two commands that are required to enable multicast on a router, when it is known that thereceivers use a specific functionality of IGMPv3.()

题型:多项选择题

Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()

题型:单项选择题

When STP UplinkFast is enabled on a switch utilizing the default bridge priority, what will the new bridgepriority be changed to?()

题型:单项选择题

What is the command to configure RSVP to reserve up to one-tenth of a Gigabit link,but only allow eachindividual flow to use 1 MB/s?()

题型:单项选择题

Which two statements are true about RED?()

题型:多项选择题