网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in a switchednetwork environment?() (Choose two.)

A. Features such as UplinkFast and BackboneFast are compatible with RSTP.

B. An RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.

C. Cisco proprietary enhancements are not transparent.

D. Information about port roles is sent to all switches.

E. RSTPs that are based on Cisco products require no additional configuration.


参考答案

更多 “ Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in a switchednetwork environment?() (Choose two.) A. Features such as UplinkFast and BackboneFast are compatible with RSTP.B. An RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.C. Cisco proprietary enhancements are not transparent.D. Information about port roles is sent to all switches.E. RSTPs that are based on Cisco products require no additional configuration. ” 相关考题
考题 Which two packet attributes contribute to the identification of a session? ()(Choose two.) A. destination portB. TTLC. IP optionsD. protocol number

考题 Which two statements are true about AH?() (Choose two.) A. AH provides data integrity.B. AH is identified by IP protocol 50.C. AH is identified by IP protocol 51.D. AH cannot work in conjunction with ESP

考题 Which two content-filtering features does FTP support?() (Choose two.) A. block extension listB. block MIME typeC. protocol command listD. notifications-options

考题 Which two statements are true about precedence values in policy?() (Choose two.) A. 1 is the default precedence.B. A lower number is preferred.C. A higher number is preferred.D. 100 is the default precedence.

考题 Refer to the exhibit. You have a non-Cisco switch that is not communicating properly while connected to the distribution-layer Cisco switching fabric.Which two best-practice actions can you take to overcome this problem? ()(Choose two.)A. Turn off MST (802.1s) on all switches.B. Turn on MST (802.1s) on all switches.C. Turn on RSTP (802.1w) on all switches.D. Turn off RSTP (802.1w) on all switches.

考题 Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in aswitched network environment?() (Choose two.) A. Features such as UplinkFast and BackboneFast are compatible with RSTP.B. An RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.C. Cisco proprietary enhancements are not transparent.D. Information about port roles is sent to all switches.E. RSTPs that are based on Cisco products require no additional configuration.

考题 At which layer of the OSI model is RSTP used to prevent loops?() A.data linkB.networkC.physicalD.transport

考题 At which layers of the OSI model do WANs operate (Choose two.)()。 A.application layerB.session layerC.transport layerD.network layerE.datalink layerF.physical layer

考题 Which of the following are associated with the application layer of the OSI model (Choose two.)()。 A.pingB.TelnetC.FTPD.TCPE.IP

考题 In a RSTP implementation, which of the following two link types are used? ()(Choose two.)A、SharedB、Point-to-PointC、DesignatedD、Multiaccess non-broadcast

考题 Which of the following are associated with the application layer of the OSI model (Choose two.)()。A、pingB、TelnetC、FTPD、TCPE、IP

考题 At which layer of the OSI model is RSTP used to prevent loops?()A、data linkB、networkC、physicalD、transport

考题 Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()A、 access point certification and software controlB、 compression and Layer 3 address mappingC、 Layer 3 addressing and distributionD、 packet encapsulation, fragmentation, and formattingE、 SNMP monitoring services

考题 Which two values are used by Spanning Tree Protocol to elect a root bridge (Choose two.)()。A、amount of RAMB、bridge priorityC、IOS versionD、IP addressE、MAC addressF、speed of the links

考题 At which layers of the OSI model do WANs operate (Choose two.)()。A、application layerB、session layerC、transport layerD、network layerE、datalink layerF、physical layer

考题 Which two packet attributes contribute to the identification of a session? ()(Choose two.)A、destination portB、TTLC、IP optionsD、protocol number

考题 Which two statements are true about precedence values in policy?() (Choose two.)A、1 is the default precedence.B、A lower number is preferred.C、A higher number is preferred.D、100 is the default precedence.

考题 多选题Which two statements are true about precedence values in policy?() (Choose two.)A1 is the default precedence.BA lower number is preferred.CA higher number is preferred.D100 is the default precedence.

考题 多选题Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in a switchednetwork environment?() (Choose two.)AFeatures such as UplinkFast and BackboneFast are compatible with RSTP.BAn RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.CCisco proprietary enhancements are not transparent.DInformation about port roles is sent to all switches.ERSTPs that are based on Cisco products require no additional configuration.

考题 多选题Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()Aaccess point certification and software controlBcompression and Layer 3 address mappingCLayer 3 addressing and distributionDpacket encapsulation, fragmentation, and formattingESNMP monitoring services

考题 多选题Which two are components of the enhanced services software architecture?() (Choose two.)ALinux kernelBrouting protocol daemonCsession-based forwarding moduleDseparate routing and security planes

考题 多选题Which two statements are true about AH?() (Choose two.)AAH provides data integrity.BAH is identified by IP protocol 50.CAH is identified by IP protocol 51.DAH cannot work in conjunction with ESP

考题 多选题avoid Layer 2 loops. Which two of the following are most probably the reasons for that preference?()AInformation about port roles is sent to all switches.BRSTPs that are based on Cisco products require no additional configuration.CFeatures such as UplinkFast and BackboneFast are compatible with RSTP.DAn RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.

考题 多选题Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)()。Aamount of RAMBbridge priorityCIOS versionDIP addressEMAC addressFspeed of the links

考题 多选题Which two passwords must be supplied in order to connect by Telnet to a properly secured Cisco switch and make changes to the device configuration? (Choose two.)()Aconsole passwordBvty passwordCaux passwordDtty passwordEenable secret passwordFusername password

考题 多选题Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in aswitched network environment?() (Choose two.)AFeatures such as UplinkFast and BackboneFast are compatible with RSTP.BAn RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.CCisco proprietary enhancements are not transparent.DInformation about port roles is sent to all switches.ERSTPs that are based on Cisco products require no additional configuration.

考题 多选题At which layers of the OSI model do WANs operate (Choose two.)()。Aapplication layerBsession layerCtransport layerDnetwork layerEdatalink layerFphysical layer

考题 多选题Which of the following are associated with the application layer of the OSI model (Choose two.)()。ApingBTelnetCFTPDTCPEIP