多项选择题Which two values are used by Spanning Tree Protocol to elect a root bridge?()

A. amount of RAM
B. bridge priority
C. IOS version
D. IP address
E. MAC address
F. speed of the links


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题What are two advantages of Layer 2 Ethernet switches over hubs?()

A. decreasing the number of collision domains
B. filtering frames based on MAC addresses
C. allowing simultaneous frame transmissions
D. increasing the size of broadcast domains
E. increasing the maximum length of UTP cabling between devices

2.多项选择题Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4?()

A. It establishes a static route to the 172.16.3.0 network.
B. It establishes a static route to the 192.168.2.0 network.
C. It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.
D. It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.
E. It uses the default administrative distance.
F. It is a route that would be used last if other routes to the same destination exist.

3.多项选择题What are two benefits of using VTP in a switching environment?()

A. It allows switches to read frame tags.
B. It allows ports to be assigned to VLANs automatically.
C. It maintains VLAN consistency across a switched network.
D. It allows frames from multiple VLANs to use a single interface.
E. It allows VLAN information to be automatically propagated throughout the switching environment.

5.多项选择题What are the two results of this configuration?()

A. The default route should have a next hop address of 64.100.0.3.
B. Hosts on the LAN that is connected to FastEthernet 0/1 are using public IP addressing.
C. The address of the subnet segment with the WWW server will support seven more servers.
D. The addressing scheme allows users on the Internet to access the WWW server.
E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internet without address translation.

6.多项选择题What are two reasons a network administrator would use CDP?()

A. to verify the type of cable interconnecting two devices
B. to determine the status of network services on a remote device
C. to obtain VLAN information from directly connected switches
D. to verify Layer 2 connectivity between two devices when Layer 3 fails
E. to obtain the IP address of a connected device in order to telnet to the device
F. to determine the status of the routing protocols between directly connected routers

7.多项选择题Which two locations can be configured as a source for the IOS image in the boot system command?()

A.RAM
B.NVRAM
C.flash memory
D.HTTP server
E.TFTP server
F.Telnet server

8.多项选择题A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration?()

A. A switch in the VTP client mode cannot update its local VLAN database.
B. A trunk link must be configured between the switches to forward VTP updates.
C. A switch in the VTP server mode can update a switch in the VTP transparent mode.
D. A switch in the VTP transparent mode will forward updates that it receives to other switches.
E. A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number.
F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.

9.多项选择题Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information?()

A. the amount of available ROM
B. the amount of available flash and RAM memory
C. the version of the bootstrap software present on the router
D. show version
E. show processes
F. show running-config

10.多项选择题What can be done to secure the virtual terminal interfaces on a router?()

A. Administratively shut down the interface.
B. Physically secure the interface.
C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D. Configure a virtual terminal password and login process.
E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.