网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()
A

RIP

B

0S:F

C

STP

D

EGP


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A RIPB 0S:FC STPD EGP” 相关考题
考题 Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?() A. AESB. TKIPC. 802.1qD. ISAKMP

考题 Which of the following protocols should be used to monitor network performance?() A.SNTPB.SMTPC.HTTPD.SNMP

考题 You are about to migrate a customer network to use a VSS. Which of these statements is true about a VSS? ()A、 The VSS switch must be the root bridge for all VLANs and is automatically designatedB、 The VSS switch is defined in RFC 4318 as a managed objectC、 The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devicesD、 A VSS interoperates with a virtual port channelE、 The 802.1Q or ISL protocols are used to maintain the operational state of the VSS devicesF、 A VSS increases the size of the spanning-tree domain

考题 When a switch port is used as a VLAN trunk, which of the following trunk modes are valid?()A、BlockingB、AutoC、DesirableD、OnE、TransparentF、Learning

考题 Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A、RIPB、0S:FC、STPD、EGP

考题 Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、 AES B、 TKIPC、 802.1qD、 ISAKMP

考题 A laptop typically has a physical switch to disable which of the following features?()A、BluetoothB、Hard Drive Impact ProtectionC、Data EncryptionD、Wireless

考题 Which of the following devices is used to move frames between a source and destination basedon a MAC address?()A、RepeaterB、HubC、RouterD、Switch

考题 Which of the following protocols is used by thin clients?()A、IPXB、NetBIOSC、RDPD、UDP

考题 Which of the following protocols is commonly used for VoIP technology?()A、TelnetB、SMTPC、SIPD、SNMP

考题 Which of the following protocols define the rules and processes used to transmit and receive block storage applications over TCP/IP?()A、iSCSIB、VoIPC、Distributed Applications over IPD、HTTPS

考题 Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP

考题 Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP

考题 Which of the following protocols would a multilayer switch use to learn the IP address of a directly connected device?()A、ARPB、BOOTPC、Inverse-ARPD、DNS

考题 Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、AESB、TKIPC、802.1qD、ISAKMP

考题 Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP

考题 Which of the following commands should be used to assure that a dump can be forced using the reset button on a system without a key switch? ()A、 sysdumpdev -k B、 sysdumpdev -L C、 sysdumpdev -K D、 sysdumpdev -P

考题 Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig

考题 多选题Which of the following characteristics describe the BPDU Guard feature?(Choose all that apply.)()AA BPDU Guard port should only be configured on ports with PortFast enabledBBPDU Guard and PortFast should not be enabled on the same port.CBPDU Guard is used to ensure that superior BPDUs are not received on a switch portDA BPDU Guard port receiving a BPDU will go into err-disable stateEA BPDU Guard port receiving a BPDU will be disabledFBPDU Guard can be enabled on any switch port

考题 单选题Which of the following commands should be used to assure that a dump can be forced using the reset button on a system without a key switch? ()A  sysdumpdev -k B  sysdumpdev -L C  sysdumpdev -K D  sysdumpdev -P

考题 单选题Which of the following commands should be used to report statistics on network protocols used by the system?()A  lsattrB  pstatC  netstatD  ifconfig

考题 多选题When a switch port is used as a VLAN trunk, which of the following trunk modes are valid?()ABlockingBAutoCDesirableDOnETransparentFLearning

考题 单选题Which of the following protocols is used to encrypt data between web servers and web browsers?()A SMTPB SIPC HTTPD SSL

考题 单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A  AES B  TKIPC  802.1qD  ISAKMP