网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two of these statements correctly describe classic PIM-SM?()
A

The IOS default is for a last-hop router to trigger a switch to the shortest path tree as soon as a new source is detected on the shared tree.

B

The IOS default is for every one of the routers on the shared tree to trigger a switch to the shortest path tree as soon as a new source is detected on the shared tree.

C

The default behavior of switching to the shortest path tree as soon as a new source is detected on the shared tree can be disabled by setting the value in the ip pim spt-threshold command to infinity.

D

The default behavior of switching to the shortest path tree as soon as a new source is detected on the shared tree can be disabled by setting the value in the ip pim spt-threshold command to zero.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two of these statements correctly describe classic PIM-SM?()AThe IOS default is for a last-hop router to trigger a switch to the shortest path tree as soon as a new source is detected on the shared tree.BThe IOS default is for every one of the routers on the shared tree to trigger a switch to the shortest path tree as soon as a new source is detected on the shared tree.CThe default behavior of switching to the shortest path tree as soon as a new source is detected on the shared tree can be disabled by setting the value in the ip pim spt-threshold command to infinity.DThe default behavior of switching to the shortest path tree as soon as a new source is detected on the shared tree can be disabled by setting the value in the ip pim spt-threshold command to zero.” 相关考题
考题 Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet? (Select two answer choices.)A.Full-duplex Ethernet uses CSMA/CD to prevent collisions.B.Half-duplex Ethernet uses a loopback circuit to detect collisions.C.A full-duplex Ethernet card allows 20Mbps for data transmission.D.Full-duplex Ethernet makes use of two pairs of wires for data.E.An Ethernet hub can operate both half and full duplex simultaneously.

考题 Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?() A. Troubleshooting is more complicated.B. Service and switch modules are underutilized.C. Layer 2 adjacency is required with the servers that use this design.D. Layer 3 adjacency is required with the servers that use this design.E. Load balancing will always occur across both access layer uplinks.

考题 Which two of these statements correctly describe classic PIM-SM?()A、The IOS default is for a last-hop router to trigger a switch to the shortest path tree as soon as a new source is detected on the shared tree.B、The IOS default is for every one of the routers on the shared tree to trigger a switch to the shortest path tree as soon as a new source is detected on the shared tree.C、The default behavior of switching to the shortest path tree as soon as a new source is detected on the shared tree can be disabled by setting the value in the ip pim spt-threshold command to "infinity."D、The default behavior of switching to the shortest path tree as soon as a new source is detected on the shared tree can be disabled by setting the value in the ip pim spt-threshold command to "zero."

考题 Which two of these statements best describe the benefits of WPAv2? (Choose two.)()A、 SSID broadcast preventionB、 man-in-the-middle attack protectionC、 cost reduction through software upgrades in all existing hardwareD、 dynamic key generationE、 RF jamming prevention

考题 Which two statements correctly describe VTP?()A、Transparent mode always has a configuration revision number of 0.B、Transparent mode cannot modify a VLAN database.C、Client mode cannot forward received VTP advertisements.D、Client mode synchronizes its VLAN database from VTP advertisements.E、Server mode can synchronize across VTP domains.

考题 Which three statements best describe multicast operation on Cisco Nexus switches in a data center?()A、 Cisco NX-OS Software does not support PIM dense mode.B、 The command ip multicast-routing must be enabled in Cisco NX-OS Software before any multicast configuration is possible on the switch.C、 PIM CLI configuration and verification commands are not available until you enable the PIM feature with the feature pim command.D、 Cisco NX-OS Software supports multicast routing per Layer 3 VRF instance.E、 The default PIM operational mode on the Cisco Nexus 7000 switch is SSM.

考题 Which two statements correctly describe the relation between a data file and the logical databasestructures()A、An extent cannot spread across data files.B、A segment cannot spread across data files.C、A data file can belong to only one tablespace.D、A data file can have only one segment created in it.E、A data block can spread across multiple data files as it can consist of multiple operating system (OS) blocks.

考题 Which two statements accurately describe an IBGP peering session?() (Choose two.)A、Peers are statically defined.B、Peers exist within the same AS.C、Peers must be directly connected to each other.D、Peers advertise routes learned from other IBGP neighbors.

考题 Which two of these statements best describe the benefits of WPAv1? ()A、 SSID broadcast preventionB、 Improved mutual authenticationC、 Improved encryption through AESD、 Improved protection against sniffing initialization vectorsE、 RF jamming prevention

考题 Which two statements describe the advantages to the use of RIP over the use of OSPF?()A、RIP requires less time to convergeB、RIP uses less bandwidthC、RIP is less complex to configureD、RIP demands fewer router resourcesE、RIP has a more accurate metric

考题 You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()A、It resembles a Layer 2 bridge.B、Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C、Inline interfaces which have no IP addresses cannot be detected.D、Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

考题 Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()A、Troubleshooting is more complicated.B、Service and switch modules are underutilized.C、Layer 2 adjacency is required with the servers that use this design.D、Layer 3 adjacency is required with the servers that use this design.E、Load balancing will always occur across both access layer uplinks.

考题 Which two of these correctly describe asymmetric routing and firewalls?()A、only operational in routed modeB、only operational in transparent modeC、only eight interfaces can belong to an asymmetric routing groupD、operational in both failover and non-failover configurationsE、only operational when the firewall has been configured for failover

考题 Which of these statements about PIM join messages in classic PIM-SM is correct?()A、PIM join messages are sent every 60 seconds to refresh the upstream router’s mroute state for the multicast tree.B、Routers send a PIM join acknowledgement in response to each PIM join message received from a downstream router.C、PIM join messages are only sent when the multicast distribution tree is first being established.D、PIM join messages are sent every three minutes to refresh the upstream router’s mroute state for the multicast tree.

考题 Which two of these statements best describe fast secure roaming? (Choose two.)()  A、 available only in autonomous APsB、 available in autonomous and lightweight APsC、 a feature of WDS in autonomous APsD、 a feature of WDS in lightweight APsE、 requires at least one AP and one Wireless LAN Services Module

考题 多选题Which two of these statements best describe fast secure roaming? (Choose two.)()Aavailable only in autonomous APsBavailable in autonomous and lightweight APsCa feature of WDS in autonomous APsDa feature of WDS in lightweight APsErequires at least one AP and one Wireless LAN Services Module

考题 多选题Which two of these statements best describe the benefits of WPAv2? (Choose two.)()ASSID broadcast preventionBman-in-the-middle attack protectionCcost reduction through software upgrades in all existing hardwareDdynamic key generationERF jamming prevention

考题 多选题Which two statements correctly describe UDLD? ()AUnidirectional link detection is achieved through monitoring STP BPDUs.BIt is recommended that it be enabled globally rather than on an individual port.CWhen an error is detected, normal mode will disable a port.DIt is recommended that it be enabled in normal mode.EIt is recommended that it be used with the loop guard feature.

考题 多选题Which two statements correctly describe VTP?()ATransparent mode always has a configuration revision number of 0.BTransparent mode cannot modify a VLAN database.CClient mode cannot forward received VTP advertisements.DClient mode synchronizes its VLAN database from VTP advertisements.EServer mode can synchronize across VTP domains.

考题 多选题Which two of these statements best describe the benefits of WPAv1? ()ASSID broadcast preventionBImproved mutual authenticationCImproved encryption through AESDImproved protection against sniffing initialization vectorsERF jamming prevention

考题 多选题Which two statements describe the advantages to the use of RIP over the use of OSPF?()ARIP requires less time to convergeBRIP uses less bandwidthCRIP is less complex to configureDRIP demands fewer router resourcesERIP has a more accurate metric

考题 多选题Which four statements correctly describe functions that are available in SQL? ()AINSTR returns the numeric position of a named character.BNVL2 returns the first non-null expression in the expression list.CTRUNCATE rounds the column, expression, or value to n decimal places.DDECODE translates an expression after comparing it to each search value.ETRIM trims the heading or trailing characters (or both) from a character string.FNVL compares two expressions and returns null if they are equal, or the first expression if they are not equal.GNULLIF compares two expressions and returns null if they are equal, or the first expression if they are not equal.

考题 多选题Which two statements correctly describe the relation between a data file and the logical databasestructures()AAn extent cannot spread across data files.BA segment cannot spread across data files.CA data file can belong to only one tablespace.DA data file can have only one segment created in it.EA data block can spread across multiple data files as it can consist of multiple operating system (OS) blocks.

考题 多选题Which two statements describe the criteria bandwidth detection uses to dynamically alter bandwidth allocation?()(Choose two.)AThroughput is raised as latency decreases.BThroughput is based on available bandwidth.CThroughput is lowered as latency decreases.DLatency is measured by SYNs returned for each metapacket.

考题 多选题Which two of these correctly describe asymmetric routing and firewalls?()Aonly operational in routed modeBonly operational in transparent modeConly eight interfaces can belong to an asymmetric routing groupDoperational in both failover and non-failover configurationsEonly operational when the firewall has been configured for failover

考题 单选题Which of these statements about PIM join messages in classic PIM-SM is correct?()A PIM join messages are sent every 60 seconds to refresh the upstream router’s mroute state for the multicast tree.B Routers send a PIM join acknowledgement in response to each PIM join message received from a downstream router.C PIM join messages are only sent when the multicast distribution tree is first being established.D PIM join messages are sent every three minutes to refresh the upstream router’s mroute state for the multicast tree.

考题 多选题Which two statements correctly describe characteristics of the PortFast feature? ()ASTP will be disabled on the port.BPortFast can also be configured on trunk ports.CPortFast is required to enable port-based BPDU guard.DPortFast is used for both STP and RSTP host ports.EPortFast is used for STP-only host ports.