网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard?()
A

alternate

B

backup

C

designated

D

disabled

E

root


参考答案

参考解析
解析: 暂无解析
更多 “多选题Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard?()AalternateBbackupCdesignatedDdisabledEroot” 相关考题
考题 What are two characteristics of "store and forward" switching? (Select two answer choices)A.Latency fluctuates regardless of frame. size.B.The switch receives the complete frame. before beginning to forward it.C.Latency through the switch varies with frame. length.D.The switch checks the destination address upon receipt of headers.

考题 A Ezonexam Ethernet switch receives a unicast frame. with a destination MAC that is listed in the switch table. What will this switch do with the frame?A. The switch will forward the frame. to a specific portB. The switch will forward the frame. to all ports except the port on which it was receivedC. The switch will return a copy of the frame. out the source portD. The switch will not forward unicast framesE. The switch will remove the destination MAC from the switch tableF. None of the above.

考题 What are three methods that may be use d to allow a switch to determine which ports to forward IP multicast messages to?() A. IGMPB. IGMP snoopingC. PIMD. CGMPE. static assignmentF. CDP

考题 Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard?() A.alternateB.backupC.designatedD.disabledE.root

考题 Refer to the topology shown in the exhibit. Which ports will be STP designated ports if all the links are operating at the same bandwidth? () A.Switch A - Fa0/0B.Switch A - Fa0/1C.Switch B - Fa0/0D.Switch B - Fa0/1E.Switch C - Fa0/0F.Switch C - Fa0/1

考题 Refer to the exhibit.Switch-1 needs to send data to a host with a MAC address of 00b0.d056.efa4.What will Switch-1 do with this data?() A.switch-1 will drop the data because it dose not have an entry for that MAC addressB.switch-1 will flood the data out all of its port from which the data originatedC.switch-1 will forward the data to its default gatewayD.tch-1 will send an ARP request out all its ports except the port from which the data originated

考题 What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。 A.The switch will not forward unicast frames.B.The switch will forward the frame to a specific port.C.The switch will return a copy of the frame out the source port.D.The switch will remove the destination MAC from the switch table.E.The switch will forward the frame to all ports except the port on which it was received.

考题 Which two statements about voice VLANs are correct?()A、Voice VLANs eliminate the need for QoS configurationB、Voice VLANs are used on trunk links to eliminate the need for QoS CoS markingsC、Voice VLANs are mainly used to reduce the number of access switch ports that are used in the networkD、Voice VLANs can be configured to forward existing CoS priorities or override themE、Voice VLANs are mainly used between access layer switches and distribution layer switchesF、Voice VLANs can be configured on Layer 2 ports only

考题 Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard?()A、alternateB、backupC、designatedD、disabledE、root

考题 What are three methods that may be use d to allow a switch to determine which ports to forward IP multicast messages to?()A、IGMPB、IGMP snoopingC、PIMD、CGMPE、static assignmentF、CDP

考题 A project requires a new server to be set up with the ability to automatically fail over its Ethernet connection to a second connection if a network failure occurs. Which of the following provides greatest resiliency?()A、Two switch ports will be needed on a switch,two Ethernet cables will be needed for theserver each connecting to two different Ethernet cards,and one IP address will be neededB、Two switch ports will be needed on two different switches two Ethernet cables will beneeded for the server each connecting to two different Ethernet cards,and one IP address will be neededC、Two switch ports will be needed on two different switches,two Ethernet cables will be needed for the server each connecting to two different Ethernet cards,two different IP addresses will be neededD、One switch port will be needed on one switch,a splitter will be needed to split the connection,two Ethernet cables will be needed for the server each connecting to two different Ethernet cards,and two different IP addresses will be needed

考题 What are the switch and bridge port characteristics of a layer two spanning-tree network that is fully converged?()A、All switch and bridge ports are in the forwarding state.B、All switch and bridge ports are in the stand-by state.C、All switch and bridge ports are assigned as either root or designated ports.D、All switch and bridge ports are in either the forwarding or blocking state.E、All switch and bridge are either blocking or looping.

考题 What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()A、The switch will not forward unicast frames.B、The switch will forward the frame to a specific port.C、The switch will return a copy of the frame out the source port.D、The switch will remove the destination MAC from the switch table.E、The switch will forward the frame to all ports except the port on which it was received.

考题 Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()A、Configure a dynamic routing protocol.B、Configure SVI interfaces with IP addresses and subnet masks.C、Configure switch ports with network addresses.D、Configure switch ports with the autostate exclude command.E、Document the MAC addresses of the switch ports.

考题 What are two characteristics of "store and forward" switching?()A、Latency fluctuates regardless of frame size.B、The switch receives the complete frame before beginning to forward it.C、Latency through the switch varies with frame length.D、The switch checks the destination address upon receipt of headers.

考题 By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access? ()A、Create an additional ACL to block the access to VLAN 1.B、Move the management VLAN to something other than default.C、Move all ports to another VLAN and deactivate the default VLAN.D、Limit the access in the switch using port security configuration.E、Use static VLAN in trunks and access ports to restrict connections.F、Shutdown all unused ports in the Catalyst switch.

考题 A project requires a new server to be set up with the ability to automatically fail over its Ethernet connection to a second connection if a network failure occurs. Which of the following provides greatest resiliency?()A、Two switch ports will be needed on a switch, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.B、Two switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.C、Two switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, two different IP addresses will be needed.D、One switch port will be needed on one switch, a splitter will be needed to split the connection, two ethernet cables will be needed for the server each connecting to two different Ethernet cards, and two different IP addresses will be needed.

考题 单选题Refer to the exhibit.Switch-1 needs to send data to a host with a MAC address of 00b0.d056.efa4.What will Switch-1 do with this data?()A switch-1 will drop the data because it dose not have an entry for that MAC addressB switch-1 will flood the data out all of its port from which the data originatedC switch-1 will forward the data to its default gatewayD tch-1 will send an ARP request out all its ports except the port from which the data originated

考题 多选题By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access?()ACreate an additional ACL to block the access to VLAN 1.BMove the management VLAN to something other than default.CMove all ports to another VLAN and deactivate the default VLAN.DLimit the access in the switch using port security configuration.EUse static VLAN in trunks and access ports to restrict connections.FShutdown all unused ports in the Catalyst switch.

考题 单选题A project requires a new server to be set up with the ability to automatically fail over its Ethernet connection to a second connection if a network failure occurs. Which of the following provides greatest resiliency?()A Two switch ports will be needed on a switch,two Ethernet cables will be needed for theserver each connecting to two different Ethernet cards,and one IP address will be neededB Two switch ports will be needed on two different switches two Ethernet cables will beneeded for the server each connecting to two different Ethernet cards,and one IP address will be neededC Two switch ports will be needed on two different switches,two Ethernet cables will be needed for the server each connecting to two different Ethernet cards,two different IP addresses will be neededD One switch port will be needed on one switch,a splitter will be needed to split the connection,two Ethernet cables will be needed for the server each connecting to two different Ethernet cards,and two different IP addresses will be needed

考题 单选题Which statement describes a spanning-tree network that has converged?()A All switch and bridge ports are in the forwarding state.B All switch and bridge ports are assigned as either root or designated ports.C All switch and bridge ports are in either the forwarding or blocking state.D All switch and bridge ports are either blocking or looping.

考题 单选题What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。A The switch will not forward unicast frames.B The switch will forward the frame to a specific port.C The switch will return a copy of the frame out the source port.D The switch will remove the destination MAC from the switch table.E The switch will forward the frame to all ports except the port on which it was received.

考题 单选题You are implementing basic switch security best practices.  Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()A Make all ports private VLAN ports.B Place all unused ports in native VLAN 1 until needed.C Proactively configure unused switch ports as access ports.D Disable Cisco Discovery Protocol globally.

考题 多选题Two Company switches are connected via a trunk using VTP. Which VTP information does a  Catalyst switch advertise on its trunk ports when using VTP?()ASTP root statusBVTP modeCNegotiation statusDManagement domainEConfiguration revision number

考题 单选题A project requires a new server to be set up with the ability to automatically fail over its Ethernet connection to a second connection if a network failure occurs. Which of the following provides greatest resiliency?()A Two switch ports will be needed on a switch, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.B Two switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.C Two switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, two different IP addresses will be needed.D One switch port will be needed on one switch, a splitter will be needed to split the connection, two ethernet cables will be needed for the server each connecting to two different Ethernet cards, and two different IP addresses will be needed.

考题 多选题What are three methods that may be use d to allow a switch to determine which ports to forward IP multicast messages to?()AIGMPBIGMP snoopingCPIMDCGMPEstatic assignmentFCDP

考题 多选题Which of the following are true regarding bridges and switches?()ABridges are faster than switches because they have fewer ports.BA switch is a multiport bridge.CBridges and switches learn MAC addresses by examining the source MAC address of each frame received.DA bridge will forward a broadcast but a switch will not.EBridges and switches increase the size of a collision domain.