Refer to the exhibit. In the diagram, the switches are running IEEE 802.1s MST. Which ports are in the MST blocking state?()
A. GE-1/2 and GE 2/1
B. GE-1/1 and GE-2/2
C. GE-3/2 and GE 4/1
D. no ports are in the blocking state
E. There is not enough information to determine which ports are in the blocking state.
您可能感兴趣的试卷
你可能感兴趣的试题
A.The originator of the TCN immediately floods this information through the network.
B.The TCN propagation is a two step process.
C.A TCN is generated and sent to the root bridge.
D.The root bridge must flood this information throughout the network.
Refer to the exhibit. Catalyst R is the root bridge for both VLAN 1 and VLAN 2.What is the easiest way to load-share traffic across both trunks and maintain redundancy in case a link fails,without using any type of EtherChannel link-bundling?()
A. Increase the root bridge priority (increasing the numerical priority number) for VLAN 2 on Catalyst D so that port D2 becomes the root port on Catalyst D for VLAN 2.
B. Decrease the port priority on R2 for VLAN 2 on Catalyst R so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1.
C. Decrease the path cost on R2 on Catalyst R for VLAN 2 so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1.
D. Increase the root bridge priority (decreasing the numerical priority number) for VLAN 2 on Catalyst R so that R2 becomes the root port on Catalyst D for VLAN 2.
A.Loop guard only operates on interfaces that are considered point-to-point by the spanning tree.
B.Loop guard only operates on root ports.
C.Loop guard only operates on designated ports.
D.Loop guard only operates on edge ports.
A.It may allocate IP addresses from an unknown subnet to the users.
B.All multicast traffic can be sniffed by using the DHCP multicast capabilities.
C.The CPU utilization of the first hop router can be overloaded by exploiting DHCP relay open ports.
D.A potential man-in-the-middle attack can be used against the clients.
A. 1) lowest root bridge id,2)lowest sender bridge id,3)lowest port id,4)lowest root path cost
B. 1) lowest root path cost,2)lowest root bridge id,3)lowest sender bridge id,4)lowest sender port id
C. 1) lowest root bridge id,2)lowest sender bridge id,3)lowest root path cost 4)owest sender port id
D. 1) lowest root bridge id,2)lowest root path cost,3)lowest sender bridge id,4)lowest sender port id
A. VTP updates are ignored and forwarded out all ports.
B. VTP updates are ignored and forwarded out trunks only.
C. VTP updates are made to the VLAN database and are forwarded out trunks only.
D. VTP updates are ignored and are not forwarded.
A.Increase the shaping rate for the priority queue.
B.Remove the policer applied on the priority queue.
C.Remove the shaper applied on the priority queue.
D.Increase the policing rate for the priority queue.
A.enforce the placement of the root bridge in the network
B.ensure that a port is transitioned to a forwarding state quickly if a BPDU is received
C.enforce the borders of an STP domain
D.ensure that any BPDUs received are forwarded into the STP domain
A.ip pim rp-address
B.ip pim ssm
C.ip pim sparse-mode
D.ip pim passive
A. Designated Root Cost
B. bridge ID priority
C. max age
D. bridge ID MAC address
E. Designated Root Priority
F. forward delay
最新试题
An expanding company is deploying leased lines between its main site and two remote sites. Thebandwidth of the leased lines is 128kb/s each,terminated on different serial interfaces on the main router.These links are used for combined VOIP and data traffic. The network administrator has implemented a VOIP solution to reduce costs,and has therefore reserved sufficient bandwidth in a low latency queue oneach interface for the VOIP traffic. Users now complain about bad voice quality although no drops areobserved in the low latency queue. What action will likely fix this problem?()
Which multicast address is reserved for cisco-rp-discovery?()
Which three options are valid ways to filter routes from a BGP peer?()
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()
Which message type is constructed and sent from an MSDP router to its MSDP peers when it receives a PIM register message knowing that the MSDP router is also configured as an RP for the PIM domain?()
Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()
Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()
Which protocol and port have been assigned by IANA for RADIUS authentication?()
Which two EIGRP options will limit a query domain?()
Which command is used to enable SSM with the range 232.0.0.0 - 255.0.0.0?()