多项选择题Which three statements about STP timers are true?()

A.STP timers values (hello, forward delay, max age) are included in each BPDU.
B.A switch is not concerned about its local configuration of the STP timers values. It will only consider the value of the STP timers contained in the BPDU it is receiving.
C.To successfully exchange BPDUs between two switches, their STP timers value (hello, forward delay, max age) must be the same.
D.If any STP timer value (hello, forward delay, max age) needs to be changed, it should at least be changed on the root bridge and backup root bridge.
E.On a switched network with a small network diameter, the STP hello timer can be tuned to a lower value to decrease the load on the switch CPU.
F.The root bridge passes the timer information in BPDUs to all routers in the Layer 3 configuration.


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题

Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.
Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()

A.DSW11(config)# spanning-tree vlan 1 priority 4096
B.DSW12(config)# set spanning-tree priority 4096
C.ASW13(config)# spanning-tree vlan 1 priority 4096
D.DSW11(config)# set spanning-tree priority 4096
E.DSW12(config)# spanning-tree vlan 1 priority 4096
F.ASW13(config)# set spanning-tree priority 4096

2.多项选择题

Given the above diagram and assuming that STP is enabled on all switch devices, 
which two statements are true?()

A.DSW11 will be elected the root bridge.
B.DSW12 will be elected the root bridge.
C.ASW13 will be elected the root bridge.
D.P3/1 will be elected the nondesignated port.
E.P2/2 will be elected the nondesignated port.
F.P3/2 will be elected the nondesignated port.

3.多项选择题Which two statements concerning STP state changes are true? ()

A.Upon bootup,a port transitions from blocking to forwarding because it assumes itself as root.
B.Upon bootup,a port transitions from blocking to listening because it assumes itself as root.
C.Upon bootup,a port transitions from listening to forwarding because it assumes itself as root.
D.If a forwarding port receives no BPDUs by the max_age time limit, it will transition to listening.
E.If a forwarding port receives an inferior BPDU, it will transition to listening.
F.If a blocked port receives no BPDUs by the max_age time limit, it will transition to listening.

4.多项选择题

In a customer’s network, VLAN Trunking Protocol (VTP) is running with a domain named main1. VLANs 1,2,3,4,5,10,20 are active on the network. Suddenly the whole network goes down. No traffic is being passed on VLANs 2,3,4,5,10,20, however traffic passes on VLAN 1 and indicates all switches are operational. Right before the network problem occurred, a switch named TEST1 was added to the network. 
What three configuration issues on TEST1 could be causing the network outage?()


A.TEST1 is configured as a VTP server with a different domain name.
B.TEST1 is not configured to participate in VTP.
C.TEST1 is configured as a VTP server with the domain name main1.
D.TEST1 has a lower VTP configuration revision than the current VTP revision.
E.TEST1 has a higher VTP configuration revision than the current VTP revision.
F.TEST1 is configured with only VLAN1.


7.判断题

Spanning-Tree Protocol is a link management protocol that provides path redundancy while 
preventing undesirable loops in the network. For an Ethernet network to function properly, only one active path can exist between two stations. Multiple active paths between stations cause loops in the network. If a loop exists in the network topology, the potential exists for duplication of messages. When loops occur, some switches see stations appear on both sides of the switch. This condition confuses the forwarding algorithm and allows duplicate frames to be forwarded. To provide path redundancy, Spanning-Tree Protocol defines a tree that spans all switches in an extended network. Spanning-Tree Protocol forces certain redundant data paths
into a standby (blocked) state. If one network segment in the Spanning-Tree Protocol becomes unreachable, or if Spanning-Tree Protocol costs change, the spanning-tree algorithm reconfigures the spanning-tree topology and reestablishes the link by activating the standby path. Spanning-Tree Protocol operation is transparent to end stations, which are unaware whether they are connected to a single LAN segment or a switched LAN of multiple segments.There is a lab about STP in Cisco CCNP 642-812 / 642- 892 exam.


Requirements: 
You will configure FastEthernet ports 0/12 through 0/24 for users who belong to VLAN 20. Also, all VLAN and VTP configurations are to be completed in global configuration mode as VLAN database mode is being deprecated by Cisco. You are required to accomplish the following tasks: 
1. Ensure the switch does not participate in VTP but forwards VTP advertisements received on trunk ports. 
2. Ensure all non-trunking interfaces (Fa0/1 to Fa0/24) transition immediately to the forwarding state of Spanning-Tree. 
3. Ensure all FastEthernet interfaces are in a permanent non-trunking mode. 
4. Place FastEthernet interfaces 0/12 through 0/24 in VLAN 20

8.判断题

Acme is a small shipping company that has an existing enterprise network comprised of 2 
switches;DSW1 and ASW2. The topology diagram indicates their layer 2 mapping. VLAN 40 is a new VLAN that will be used to provide the shipping personnel access to the server. For security reasons, it is necessary to restrict access to VLAN 20 in the following manner: 
- Users connecting to ASW1’s port must be authenticate before they are given access to the network. -Authentication is to be done via a Radius server:
- Radius server host: 172.120.39.46
-Radius key: rad123 
- Authentication should be implemented as close to the host device possible. 
- Devices on VLAN 20 are restricted to in the address range of 172.120.40.0/24. 
- Packets from devices in the address range of 172.120.40.0/24 should be passed on VLAN 20. 
- Packets from devices in any other address range should be dropped on VLAN 20. 
- Filtering should be implemented as close to the server farm as possible. 
The Radius server and application servers will be installed at a future date. You have been tasked with implementing the above access control as a pre-condition to installing the servers. You must use the available IOS switch features.
 

10.判断题

Network topology exhibit: 
 


You work as a network administrator at . You study the network topology exhibit carefully. is a small 
company that has an existing enterprise network consisting of two switches named 1 and 2. The network topology schemata indicates their layer 2 mapping. VLAN 40 is a new VLAN that will be used to provide the shipping personnel access to the server. For security reasons, it is necessary to restrict access to VLAN 20 in the following manner: 
Users connecting to 1’s port must be authenticate before they are given access to the network. Authentication is to be done via a Radius server: 
Radius server host: 172.120.39.46 
Radius key: key 
Authentication should be implemented as close to the host device possible. 
Devices on VLAN 20 are restricted to in the address range of 172.120.40.0/24. 
Packets from devices in the address range of 172.120.40.0/24 should be passed on VLAN 20. 
Packets from devices in any other address range should be dropped on VLAN 20. Filtering should be implemented as close to the server farm as possible. 
The Radius server and application servers will be installed at a future date. You have been tasked with implementing the above access control as a pre-condition to installing the servers. You must use the available IOS switch features.

最新试题

Which statement is correct about the use of the virtual interface on a WLC ?()

题型:单项选择题

Refer to the exhibit. LACP has been configured on Switch1 as shown. Which is the correct command set to configure LACP on Switch2?()

题型:单项选择题

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()

题型:单项选择题

Which two statements are true when the extended system ID feature is enabled? ()

题型:多项选择题

Which router redundancy protocol cannot be configured for interface tracking?()

题型:单项选择题

Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()

题型:单项选择题

Refer to the exhibit. What does the command channel-group 1 mode desirable do? () 

题型:单项选择题

Which statement is correct about RSTP port roles?()

题型:单项选择题

Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()

题型:单项选择题

Which two statements are true about BPDU port-guard and BPDU filtering?()

题型:多项选择题