网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which statement describes a spanning-tree network that has converged?()
A

All switch and bridge ports are in the forwarding state.

B

All switch and bridge ports are assigned as either root or designated ports.

C

All switch and bridge ports are in either the forwarding or blocking state.

D

All switch and bridge ports are either blocking or looping.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which statement describes a spanning-tree network that has converged?()A All switch and bridge ports are in the forwarding state.B All switch and bridge ports are assigned as either root or designated ports.C All switch and bridge ports are in either the forwarding or blocking state.D All switch and bridge ports are either blocking or looping.” 相关考题
考题 The Ezonexam network administrator needs to verify that switch interface 0/5 has been assigned to the Marketing VLA.N. Which command will accomplish this task?A. Show vlanB. Show mac-address-tableC. Show vtp statusD. show spanning-tree rootE. show ip interface briefF. None of the above

考题 Which statement describes the primary difference between the WX and WXC platforms?() A. The WX platform has built-in hard drives.B. The WXC platform has no built-in hard drives.C. The WX platform uses Network Sequence Caching technology.D. The WXC platform uses the Network Sequence Caching technology

考题 A network administrator needs to verify that switch interface 0/5 has been assigned to the Sales VLA.N. Which command will accomplish this task?() A. Show vlanB. Show mac-address-tableC. Show vtp statusD. show spanning-tree rootE. show ip interface brief

考题 Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding state?() A. redundantB. spannedC. provisionedD. converged

考题 A network administrator needs to verify that switch interface 0/5 has been assigned to the Sales VLA.N. Which command will accomplish this task?()A、Show vlanB、Show mac-address-tableC、Show vtp statusD、show spanning-tree rootE、show ip interface brief

考题 In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard

考题 Which term describes a spanning-tree network that has all switch ports in either the blocking or forwardingstate? ()A、redundantB、spannedC、provisionedD、converged

考题 Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()A、The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch portB、The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.C、The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch portD、The default network setting is "HIGH"

考题 Which statement describes a spanning-tree network that has converged?()A、All switch and bridge ports are in the forwarding state.B、All switch and bridge ports are assigned as either root or designated ports.C、All switch and bridge ports are in either the forwarding or blocking state.D、All switch and bridge ports are either blocking or looping.

考题 A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()A、For the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.B、For the two vlans to communicate, a network statement for each subinterface needs to be  added  to the OSPF configuration.C、Direct inter-vlan communication does not require OSPFD、OSPF cannot be used if router-on-a-stick is configured on the router

考题 Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the path cost calculated?()A、number of hopsB、priority of the bridgeC、interface bandwidthD、interface delayE、None of the above

考题 As an experienced Network Engineer, you are required to implement the security architecture assessment. Which of the following statement describes the most important reason for that?()A、Create a design specification document.B、Integrate routing and switching components.C、Document power and UPS availabilityD、Document the customer's current and future technology projects.

考题 Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding state?()A、redundantB、spannedC、provisionedD、converged

考题 Which one of the statements below correctly describes the Virtual Router Redundancy Protocol  (VRRP),  which is being used in the Company network to provide redundancy?()A、 A VRRP group has one active and one or more standby virtual routers.B、 A VRRP group has one master and one or more backup virtual routers.C、 A VRRP group has one master and one redundant virtual router.D、 None of the other alternatives apply

考题 In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard

考题 Which statement describes the primary difference between the WX and WXC platforms?()A、The WX platform has built-in hard drives.B、The WXC platform has no built-in hard drives.C、The WX platform uses Network Sequence Caching technology.D、The WXC platform uses the Network Sequence Caching technology

考题 Which statement accurately describes firewall user authentication?()A、Firewall user authentication provides another layer of security in a network.B、Firewall user authentication provides a means for accessing a JUNOS Software-based security device.C、Firewall user authentication enables session-based forwarding.D、Firewall user authentication is used as a last resort security method in a network.

考题 单选题Which statement describes the primary difference between the WX and WXC platforms?()A The WX platform has built-in hard drives.B The WXC platform has no built-in hard drives.C The WX platform uses Network Sequence Caching technology.D The WXC platform uses the Network Sequence Caching technology

考题 单选题A network administrator needs to verify that switch interface 0/5 has been assigned to the Sales VLA.N. Which command will accomplish this task?()A Show vlanB Show mac-address-tableC Show vtp statusD show spanning-tree rootE show ip interface brief

考题 单选题Which statement accurately describes firewall user authentication?()A Firewall user authentication provides another layer of security in a network.B Firewall user authentication provides a means for accessing a JUNOS Software-based security device.C Firewall user authentication enables session-based forwarding.D Firewall user authentication is used as a last resort security method in a network.

考题 单选题Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the path cost calculated?()A number of hopsB priority of the bridgeC interface bandwidthD interface delayE None of the above

考题 多选题Which of the following network topologies BEST describes a VPN? ()(Select TWO)APoint to PointBPoint to MultipointCVLANDRingEBus

考题 单选题Which one of the statements below correctly describes the Virtual Router Redundancy Protocol  (VRRP),  which is being used in the Company network to provide redundancy?()A  A VRRP group has one active and one or more standby virtual routers.B  A VRRP group has one master and one or more backup virtual routers.C  A VRRP group has one master and one redundant virtual router.D  None of the other alternatives apply

考题 单选题Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()A The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch portB The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.C The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch portD The default network setting is HIGH

考题 单选题A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()A For the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.B For the two vlans to communicate, a network statement for each subinterface needs to be  added  to the OSPF configuration.C Direct inter-vlan communication does not require OSPFD OSPF cannot be used if router-on-a-stick is configured on the router

考题 多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard

考题 单选题As an experienced Network Engineer, you are required to implement the security architecture assessment. Which of the following statement describes the most important reason for that?()A Create a design specification document.B Integrate routing and switching components.C Document power and UPS availabilityD Document the customer's current and future technology projects.