多项选择题Why do large OSPF networks use a hierarchical design?()

A. to confine network instability to single areas of the network.
B. to reduce the complexity of router configuration
C. to speed up convergence
D. to lower costs by replacing routers with distribution layer switches
E. to decrease latency by increasing bandwidth
F. to reduce routing overhead


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题What are three features of the IPV6 protocol?()

A.complicated header
B.plug-and-play
C.no broadcasts
D.checksums
E.optional IPsec
F.autoconfiguration

2.多项选择题Which two statements about static NAT translations are true?()

A. They are always present in the NAT table.
B. They allow connection to be initiated from the outside.
C. They can be configured with access lists, to allow two or more connections to be initiated from the outside.
D. They require no inside or outside interface markings because addresses are statically defined.

3.多项选择题Which three statements about RSTP are true?()

A. RSTP significantly reduces topology reconverging time after a link failure.
B. RSTP expends the STP port roles by adding the alternate and backup roles.
C. RSTP port atates are blocking,discarding,learing,or forwarding.
D. RSTP also uses the STP proprsal-agreement sequence.
E. RSTP use the same timer-baseed process as STP on point-to-point links.
F. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.

4.多项选择题What are two benefits of using NAT?()

A. NAT protects network security because private networks are not advertised.
B. NAT accelerates the routing process because no modifications are made on the packets.
C. Dynamic NAT facilitates connections from the outside of the network.
D. NAT facilitates end-to-end communication when IPsec is enable.
E. NAT eliminates the need to re-address all host that require extemal access.
F. NAT conserves addresses through host MAC-level multiplexing.

5.多项选择题Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()

A. SW1#show swithport port-security interface FastEthernet 0/12
B. SW1# show swithport port-secure interface FastEthernet 0/12
C. SW1# show port-secure interface FastEthernet 0/12
D. SW1#show running-config
E. SW1#show port-security interface FastEthernet 0/12

6.多项选择题In an Ethernet network, under what two scenarios can devices transmit?()

A. when they receive a special token
B. when there is a carrier
C. when they detect no other devices are sending
D. when the medium is idle
E. when the server grants access

7.多项选择题By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access?()

A. Create an additional ACL to block the access to VLAN 1.
B. Move the management VLAN to something other than default.
C. Move all ports to another VLAN and deactivate the default VLAN.
D. Limit the access in the switch using port security configuration.
E. Use static VLAN in trunks and access ports to restrict connections.
F. Shutdown all unused ports in the Catalyst switch.

8.多项选择题Which of the following correctly describe steps in the OSI data encapsulation process?()

A. The transport layer divides a data stream into segments and may add reliability and flow control information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.

9.多项选择题Which three of these statements regarding 802.1Q trunking are correct?()

A. 802.1Q native VLAN frames are untagged by default.
B. 802.1Q trunking ports can also be secure ports.
C. 802.1Q trunks can use 10 Mb/s Ethernet interfaces.
D. 802.1Q trunks require full-duplex, point-to-point connectivity.
E. 802.1Q trunks should have native VLANs that are the same at both ends.

10.多项选择题Which two of these statements regarding RSTP are correct?()

A. RSTP cannot operate with PVST+.
B. RSTP defines new port roles.
C. RSTP defines no new port states.
D. RSTP is a proprietary implementation of IEEE 802.1D STP.
E. RSTP is compatible with the original IEEE 802.1D STP.

最新试题

On which options are standard access list based?()

题型:单项选择题

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

题型:单项选择题

What is the purpose of the cisco Vlan Trunking protocol?()

题型:单项选择题

An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()

题型:单项选择题

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

题型:单项选择题

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

题型:单项选择题

How are VTP advertisements delivered to switches across the network?()

题型:单项选择题

Which command encrypts all plaintext passwords?()

题型:单项选择题

Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()

题型:单项选择题

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()

题型:单项选择题