网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two statements best describe spanning-tree BPDU processing for a blocking port?()
A

BPDUs that enter a blocking port are discarded.

B

BPDUs that enter a blocking port are processed.

C

Loopguard puts an interface into a loop-inconsistent state when BPDUs stop being received on a blocking port.

D

BPDUs are only processed on forwarding ports.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two statements best describe spanning-tree BPDU processing for a blocking port?()ABPDUs that enter a blocking port are discarded.BBPDUs that enter a blocking port are processed.CLoopguard puts an interface into a loop-inconsistent state when BPDUs stop being received on a blocking port.DBPDUs are only processed on forwarding ports.” 相关考题
考题 Which two of the following values does STP take into consideration when it elects the root bridge? (Select two answer choices)A. The BPDU version numberB. The access layer bridge settingC. The Bridge IDD. The spanning-tree update numberE. The bridge priorityF. The VLAN number

考题 Which spanning-tree command would cause a PortFast-enabled interface to lose its PortFast-operational status and disable BPDU filtering if it receives BPDUs?()A、spanning-tree guard rootB、spanning-tree portfast bpduguard defaultC、spanning-tree bpduguard enableD、spanning-tree bpdufilter enableE、spanning-tree portfast bpdufilter default

考题 Which two of these statements best describe the benefits of WPAv2? (Choose two.)()A、 SSID broadcast preventionB、 man-in-the-middle attack protectionC、 cost reduction through software upgrades in all existing hardwareD、 dynamic key generationE、 RF jamming prevention

考题 In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard

考题 Which two of the following values does STP take into consideration when it elects the root bridge?()A、The BPDU version numberB、The access layer bridge settingC、The Bridge IDD、The spanning-tree update numberE、The bridge priorityF、The VLAN number

考题 Which two statements best describe Cisco IOS IP SLA?()A、only implemented between Cisco source and destination-capable devicesB、statistics provided by syslog, CLI, and SNMPC、measures delay, jitter, packet loss, and voice qualityD、only monitors VoIP traffic flowsE、provides active monitoringF、provides passive monitoring

考题 Which two statements correctly describe characteristics of the PortFast feature? ()A、STP will be disabled on the port.B、PortFast can also be configured on trunk ports.C、PortFast is required to enable port-based BPDU guard.D、PortFast is used for both STP and RSTP host ports.E、PortFast is used for STP-only host ports.

考题 Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK

考题 Which two statements accurately describe an IBGP peering session?() (Choose two.)A、Peers are statically defined.B、Peers exist within the same AS.C、Peers must be directly connected to each other.D、Peers advertise routes learned from other IBGP neighbors.

考题 Which two of these statements best describe the benefits of WPAv1? ()A、 SSID broadcast preventionB、 Improved mutual authenticationC、 Improved encryption through AESD、 Improved protection against sniffing initialization vectorsE、 RF jamming prevention

考题 Which two statements best describe CBWFQ?()A、The CBWFQ scheduler provides a guaranteed minimum amount of bandwidth to each class.B、CBWFQ services each class queue using a strict priority scheduler.C、The class-default queue only supports WFQ.D、Inside a class queue, processing is always FIFO, except for the class-default queue.

考题 Which two statements best describe EtherChannel?()A、EtherChannel technology helps aggregate traffic grouping multiple,full-duplex point-to-point linkstogetherB、EtherChannel technology is based on the 802.1 IEEE standC、EtherChannel can aggregate up to 800 Mbps,8 Gbps,or Gbps of aggregate bandwidth for a Fast EtherChannel,Gigabit EtherChannel,or 10 Gigabit EtherChannel connection respectivelyD、EtherChannel is defined for Rapid Spanning Tree for faster convergence

考题 Which two of these statements best describe the benefits of the Cisco Compatible Extensions Program? (Choose two.)()A、 offers a feature-rich implementation alternative to Wi-Fi certificationB、 accelerates the availability of innovative features while maintaining interoperabilityC、 provides innovative features only on Cisco’s wireless client adaptersD、 provides an evolving set of specifications for interoperabilityE、 eliminates the need for testing by providing innovative features to wireless client vendors through a one-time license fee

考题 Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()A、It specifies use of a static encryption key that must be changed frequently to enhance security.B、It requires use of an open authentication method.C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D、It requires that all access points and wireless devices use the same encryption key.E、It includes authentication by PSK

考题 Which two of these statements best describe fast secure roaming? (Choose two.)()  A、 available only in autonomous APsB、 available in autonomous and lightweight APsC、 a feature of WDS in autonomous APsD、 a feature of WDS in lightweight APsE、 requires at least one AP and one Wireless LAN Services Module

考题 In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard

考题 多选题Which two of these statements best describe fast secure roaming? (Choose two.)()Aavailable only in autonomous APsBavailable in autonomous and lightweight APsCa feature of WDS in autonomous APsDa feature of WDS in lightweight APsErequires at least one AP and one Wireless LAN Services Module

考题 多选题Which two of these statements best describe the benefits of WPAv2? (Choose two.)()ASSID broadcast preventionBman-in-the-middle attack protectionCcost reduction through software upgrades in all existing hardwareDdynamic key generationERF jamming prevention

考题 多选题Which two of these statements best describe the benefits of WPAv1? ()ASSID broadcast preventionBImproved mutual authenticationCImproved encryption through AESDImproved protection against sniffing initialization vectorsERF jamming prevention

考题 单选题Which two terms can best describe the following pairs of words: table—tables, day + break—daybreak.A inflection and compoundB compound and derivationC inflection and derivation

考题 多选题Which two statements describe the advantages to the use of RIP over the use of OSPF?()ARIP requires less time to convergeBRIP uses less bandwidthCRIP is less complex to configureDRIP demands fewer router resourcesERIP has a more accurate metric

考题 多选题Which two of these statements best describe fast secure roaming for the wireless core feature set using autonomous access points? (Choose two.) ()AIt is compatible with all wireless clients.BIt reduces roaming latency through reduced client RF channel scanning enhancements.CIt reduces roaming latency to targeted times of less than 75ms.DRoaming occurs without reauthentication through a centralized RADIUS server.EIt is enabled through WLSE deployment.

考题 多选题Which two statements describe the criteria bandwidth detection uses to dynamically alter bandwidth allocation?()(Choose two.)AThroughput is raised as latency decreases.BThroughput is based on available bandwidth.CThroughput is lowered as latency decreases.DLatency is measured by SYNs returned for each metapacket.

考题 多选题Which two statements correctly describe characteristics of the PortFast feature? ()ASTP will be disabled on the port.BPortFast can also be configured on trunk ports.CPortFast is required to enable port-based BPDU guard.DPortFast is used for both STP and RSTP host ports.EPortFast is used for STP-only host ports.

考题 多选题Which two statements best describe Cisco IOS IP SLA?()Aonly implemented between Cisco source and destination-capable devicesBstatistics provided by syslog, CLI, and SNMPCmeasures delay, jitter, packet loss, and voice qualityDonly monitors VoIP traffic flowsEprovides active monitoringFprovides passive monitoring

考题 多选题Which two of the following values does STP take into consideration when it elects the root bridge?()AThe BPDU version numberBThe access layer bridge settingCThe Bridge IDDThe spanning-tree update numberEThe bridge priorityFThe VLAN number

考题 多选题Which two statements best describe CBWFQ?()AThe CBWFQ scheduler provides a guaranteed minimum amount of bandwidth to each class.BCBWFQ services each class queue using a strict priority scheduler.CThe class-default queue only supports WFQ.DInside a class queue, processing is always FIFO, except for the class-default queue.