A.The VLAN to instance mapping is a normal 16-byte field in the MST BPDU.
B.The VLAN to instance mapping is a normal 12-byte field in the MST BPDU.
C.The VLAN to instance mapping is a 16-byte MD5 signature field in the MST BPDU.
D.The VLAN to instance mapping is a 12-byte MD5 signature field in the MST BPDU.
您可能感兴趣的试卷
你可能感兴趣的试题
A.lowest root bridge ID
B.lowest path cost to root bridge
C.lowest sender bridge ID
D.highest port ID
E.highest root bridge ID
F.highest path cost to root bridge
A.VTPv3 supports 8K VLANs.
B.VTPv3 supports private VLAN mapping.
C.VTPv3 allows for domain discovery.
D.VTPv3 uses a primary server concept to avoid configuration revision issues.
E.VTPv3 is not compatible with VTPv1 or VTPv2.
F.VTPv3 has a hidden password option.
A. interface bandwidth
B. interface delay
C. interface bandwidth and delay
D. hop count
E. bridge priority
A. Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot
B. UDLD protects against STP failures caused by cabling problems that create one-way links.
C. Loop guard detects and protects against duplicate packets being received and transmitted on different ports
D. UDLD protects against unidirectional cabling problems on copper and fiber media.
E. Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.
A.followers field
B.MD5 digest
C.VLAN information
D.sequence number
Refer to the exhibit. In the diagram,the switches are running IEEE 802.1w RSPT. On which ports should root guard be enabled in order to facilitate deterministic root bridge election under normal and failure scenarios?()
A. GE-3/1, GE-3/2
B. FE-2/1, FE-3/2
C. GE-1/1, GE-1/2
D. GE-4/1, GE-4/2
E. GE-2/1, GE-2/2
F. GE-3/1, GE-3/2, GE-4/1, GE-4/2, FE-2/1, FE-3/2
A.runts
B.FCS errors
C.interface resets
D.late collisions
A.mpls ip cef
B.port-channel ip cef
C.mpls ip port-channel cef
D.port-channel load balance
E.mpls ip load-balance
F.ip cef EtherChannel channel-id XOR L4
G.ip cef connection exchange
Refer to the exhibit. In the diagram, the switches are running IEEE 802.1s MST. Which ports are in the MST blocking state?()
A. GE-1/2 and GE 2/1
B. GE-1/1 and GE-2/2
C. GE-3/2 and GE 4/1
D. no ports are in the blocking state
E. There is not enough information to determine which ports are in the blocking state.
A.The originator of the TCN immediately floods this information through the network.
B.The TCN propagation is a two step process.
C.A TCN is generated and sent to the root bridge.
D.The root bridge must flood this information throughout the network.
最新试题
Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()
An expanding company is deploying leased lines between its main site and two remote sites. Thebandwidth of the leased lines is 128kb/s each,terminated on different serial interfaces on the main router.These links are used for combined VOIP and data traffic. The network administrator has implemented a VOIP solution to reduce costs,and has therefore reserved sufficient bandwidth in a low latency queue oneach interface for the VOIP traffic. Users now complain about bad voice quality although no drops areobserved in the low latency queue. What action will likely fix this problem?()
In order to configure two routers as anycast RPs, which of these requirements, af a minimum, must besatisfied?()
Which two are differences between IGMPv2 and IGMPv3 reports?()
Which three message types are valid PIMv2 message types?()
When STP UplinkFast is enabled on a switch utilizing the default bridge priority, what will the new bridgepriority be changed to?()
Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()
Which multicast address is reserved for cisco-rp-discovery?()
Based on the exhibit presented. What will be the objective of this route map when applied to traffic passing through a router?()
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()