单项选择题You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs? ()

A. Only use fiber in pairs.
B. Configure root guard on your switches.
C. Do not use fiber but use copper.
D. Configure UDLD to prevent one-way link conditions.


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题Which feature would prevent guest users from gaining network access by unplugging an IP phone andconnecting a laptop computer?()

A.IPSec VPN
B.SSL VPN
C.port security
D.port security with statically configured MAC addresses
E.private VLANs

2.多项选择题Refer to the exhibit. There are two sites connected across WAN links. All intersite and intrasite links always have the same routing metric. The network administrator sees only the top routers and links being used by hosts at both LAN A and LAN B. What would be two suggestions to load-balance the traffic across both WAN links?()

A. Make HSRP track interfaces between the edge and core routers.
B. Replace HSRP with GLBP.  用GLBP替换HSRP
C. Add crossed intrasite links: R1-R4, R2-R3, R5-R8, and R6-R7.
D. Make R3 and R8 have lower HSRP priority than R1 and R7.
E. Replace HSRP with VRRP

4.单项选择题Customer X has a hub-and-spoke Frame Relay network, with a central office and two branch offices (RemoteA and RemoteB). Each location has only one physical link to the Frame Relay cloud and RemoteB has a router that is not a Cisco router. Since the installation, there is no connectivity between RemoteB and the central office. What is a possible solution to this issue? ()

A. Because Frame Relay IETF encapsulation is only configurable at interface level, you must use IETF encapsulation on all routers.
B. This is not a possible scenario. A dedicated Frame Relay link to RemoteB is mandatory at the central office.
C. The router at RemoteB must be replaced by a Cisco router.
D. Use Frame Relay IETF encapsulation on a per-VC basis on the central office router.
E. There is a problem in the Frame Relay cloud, because Cisco routers are compatible with IETF Frame Relay.

5.单项选择题For a router connected to two ISPs for redundancy, using IPSLA and static routing, how would youconfigure uRPF on the uplink interface?()

A.ip verify unicast source reachable-via any
B.ip verify unicast reverse-path
C.ip verify unicast reverse-path loose
D.ip verify unicast reverse-path strict

6.单项选择题Before inserting a new switch in the network, the network administrator checks that the VTP domain name is correct, the VTP mode is set to server, and revision is lower than the switches in the network. The administrator then configures interfaces and trunks, erases existing VLANs, and connects the switch to the network. Following that procedure, there is no connectivity in the network. What is a possible cause of this problem? ()

A. Because the configuration revision of the new switches is lower than the rest of the network,it can change the VLAN database of the other switches.
B. As a VTP server, the new switch deleted all VLANs of the network.
C. Erasing VLANs increases the VTP configuration revision.
D. Since the configuration revision of the network is higher than the new switch,the VLAN database was automatically synchronized.

7.多项选择题

Refer to the exhibit. Users from the Engineering VLAN complain that every time Business VLAN users have a network connectivity issue, the Engineering VLAN users usually have problems experiencing slow response or network connectivity problems. After troubleshooting, an unauthorized switch 2 was found. This unauthorized switch has been a regular problem, assuming the root bridge function under the spanning-tree domain and causing the 
Engineering VLAN to be unstable. Which three of these actions could be suggested to fix the problem?()

A. Upgrade Spanning Tree Protocol to Rapid Spanning Tree Protocol.
B. Change Business VLAN PCs to switch 1 and switch 4.
C. Force the root bridge to be switch 2, instead.
D. Adjust spanning-tree timers (max-age and forward-delay).
E. Shut down all unused ports.
F. Use MSTP to separate the Engineering VLAN from the Business VLAN to optimize spanning-tree convergence time within each VLAN

8.单项选择题What is true about IP Source Guard with port security?()

A.Binding should be manually configured.
B.It is not supported if IEEE 802.1x port-based authentication is enabled.
C.The DHCP server must support option 82, or the client is not assigned an IP address.
D.It filters based on source IP address only.

9.单项选择题

Refer to exhibits 1 and 2. In exhibit 1, all users on the LAN segment use router A as the active HSRP router. Router B is the standby router for the HSRP. In exhibit 2, the network management team reported that there is no utilization on the WAN link B. To solve this problem, you decide to change the logical topology of your LAN, but you are not sure about what changes must be made. You must manage HSRP or change it to another protocol in order to provide the most scalable design, automatic redundancy, and load balancing. Which one of these actions would be the best choice? ()

A. Use MHSRP, with three users using router A as the default gateway and three users using router B as the default gateway.
B. Keep HSRP and activate PBR to redirect half of the traffic to the other WAN link.
C. Use the backup interface on the WAN link B to provide load balancing for all users.
D. Use GLBP instead, because it provides you with up to three MAC addresses for the same default gateway virtual IP address.
E. Use GLBP instead, because it provides you with up to four MAC addresses for the same default gateway virtual IP address.

最新试题

Which three protocols or applications should be placed in a class that is configured with WRED?()

题型:多项选择题

What is the correct command to set the router ID for an OSPFv3 process?()

题型:单项选择题

Which of the following is true about the MPLS header and its EXP field size?()

题型:单项选择题

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()

题型:多项选择题

Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()

题型:单项选择题

How does an IPv6 router deal with a packet that is larger than the outgoing interface MTU?()

题型:单项选择题

What is also called Type 0 authentication in OSPF on Cisco Routers?()

题型:单项选择题

Which three message types are valid PIMv2 message types?()

题型:多项选择题

All of these are fundamental building blocks of differentiated services Traffic Conditioner Block exceptwhich one?()

题型:单项选择题

Which two statements are true about RED?()

题型:多项选择题