网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
The Company network utilizes the Multiple-instance Spanning Tree protocol in its switched LAN.   Which three statements about the MST protocol (IEEE 802.1S) are true? ()
A

To verify the MST configuration, the show pending command can be used in MST configuration  mode.

B

When RSTP and MSTP are configured; UplinkFast and BackboneFast must also be enabled.

C

All switches in the same MST region must have the same VLAN-to-instance mapping, but  different configuration revision numbers.

D

All switches in an MST region, except distribution layer switches, should have their priority  lowered from the default value 32768.

E

An MST region is a group of MST switches that appear as a single virtual bridge to adjacent  CST and MST regions.

F

Enabling MST with the spanning-tree modemst global configuration command also enables  RSTP.


参考答案

参考解析
解析: 暂无解析
更多 “多选题The Company network utilizes the Multiple-instance Spanning Tree protocol in its switched LAN.   Which three statements about the MST protocol (IEEE 802.1S) are true? ()ATo verify the MST configuration, the show pending command can be used in MST configuration  mode.BWhen RSTP and MSTP are configured; UplinkFast and BackboneFast must also be enabled.CAll switches in the same MST region must have the same VLAN-to-instance mapping, but  different configuration revision numbers.DAll switches in an MST region, except distribution layer switches, should have their priority  lowered from the default value 32768.EAn MST region is a group of MST switches that appear as a single virtual bridge to adjacent  CST and MST regions.FEnabling MST with the spanning-tree modemst global configuration command also enables  RSTP.” 相关考题
考题 The degree to which a company accepts and utilizes project management is often dependent upon the _____ and _____ of the project.ACompetition, dollar valueBType of industry, manpower requirementsCSize, natureDQuality requirements, manpower requirementEType of industry, risk

考题 ● The degree to which a company accepts and utilizes project management is often dependent upon the _____ and _____ of the project.A Competition, dollar valueB Type of industry, manpower requirementsC Size, natureD Quality requirements, manpower requirementE Type of industry, risk

考题 In which of the following topologies could the failure of one machine cause the entire network tostop functioning?() A. MeshB. Token ringC. StarD. Spanning tree

考题 A company utilizes the GFS backup standard. Which of the following describes this backup method?() A. Greatest, Final, SequentialB. Full, Partial, IncrementalC. Monthly, Weekly, DailyD. Full, Differential, Incremental

考题 You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

考题 Which two are characteristics of the IS -IS protocol but not OSPF?() A. forms adjacencies with all neighborsB. supports demand circuit routingC. provides routing support for multiple network layer protocolsD. utilizes SPF algorithmE. provides for network scalability by allowing the network to be separated into areasF. three layers of hierarchical routing

考题 A company is experiencing network delays. The network administrator discovers that a worker in a location far from the MDF has connected an old 10BASE-T switch with redundant links to the existing network.How could this action be responsible for the impaired network performance?()A. Connecting a host to the old switch has created a broadcast storm.B. The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.C. The old switch does not support VLANs, which has disabled the VLAN configuration of the entire the network.D. The old switch does not support full-duplex operation, effectively forcing half-duplex operation throughout the network.E. Spanning Tree Protocol has elected the old switch as the root bridge, creating inefficient data paths through the switched network.

考题 What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()A、To protect the network in case someone inadvertently creates a physical loop in itB、To ensure that if a device fails another device automatically take over for itC、To allow management of all network devicesD、To aggregate logical network groups together at one central point

考题 In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard

考题 The Company network utilizes the Multiple-instance Spanning Tree protocol in its switched LAN.   Which three statements about the MST protocol (IEEE 802.1S) are true? ()A、 To verify the MST configuration, the show pending command can be used in MST configuration  mode.B、 When RSTP and MSTP are configured; UplinkFast and BackboneFast must also be enabled.C、 All switches in the same MST region must have the same VLAN-to-instance mapping, but  different configuration revision numbers.D、 All switches in an MST region, except distribution layer switches, should have their priority  lowered from the default value 32768.E、 An MST region is a group of MST switches that appear as a single virtual bridge to adjacent  CST and MST regions.F、 Enabling MST with the "spanning-tree modemst" global configuration command also enables  RSTP.

考题 Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding state?()A、redundantB、spannedC、provisionedD、converged

考题 Which two are characteristics of the IS -IS protocol but not OSPF?()A、forms adjacencies with all neighborsB、supports demand circuit routingC、provides routing support for multiple network layer protocolsD、utilizes SPF algorithmE、provides for network scalability by allowing the network to be separated into areasF、three layers of hierarchical routing

考题 Under which two circumstances should Spanning Tree Protocol be implemented? ()A、 to ensure a loop-free topologyB、 to protect against user-side loopsC、 when a VLAN spans access layer switchesD、 for the most deterministic and highly available network topologyE、 because of the risk of lost connectivity without Spanning Tree Protocol

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

考题 In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard

考题 Which two statements about the various implementations of STP are true?()A、mon Spanning Tree maintains a separate spanning-tree instance for each VLAN configured in the network.B、The Spanning Tree Protocol (STP) is an evolution of the IEEE 802.1w standard.C、Per-VLAN Spanning Tree (PVST) supports 802.1Q trunking.D、Per-VLAN Spanning Tree Plus(PVST+) is an enhancement to 802.1Q specification and is supported only on Cisco devices.E、Rapid Spanning Tree Protocol (RSTP) includes features equivalent to Cisco PortFast, UplinkFast, and BackboneFast for faster network reconvergence.F、Multiple Spanning Tree (MST) assumes one spanning-tree instance for the entire Layer 2 network, regardless of the multiple number of VLANs

考题 A company utilizes the GFS backup standard. Which of the following describes this backup method?()A、Greatest, Final, SequentialB、Full, Partial, IncrementalC、Monthly, Weekly, DailyD、Full, Differential, Incremental

考题 In which of the following topologies could the failure of one machine cause the entire network tostop functioning?()A、MeshB、Token ringC、StarD、Spanning tree

考题 A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()A、Unmanaged switchB、Hardware firewallC、HubD、Managed switch

考题 In a TCP/IP network, which of the following commands utilizes the ICMP protocol?()A、rcpB、tftpC、pingD、rpcinfo

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

考题 You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.

考题 You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box. 

考题 单选题Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol.You need to connect the computers in the marketing department to the network. What must you do? ()A Configure the NWLink frame type of the network adapters to be ethernet 802.3.B Configure the NWLink frame type of the network adapters to be ethernet II.C Replace the network adapters with 10/100 BNC adapters.D Replace the network adapters with 10/100 UTP network adapters.

考题 单选题What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()A To protect the network in case someone inadvertently creates a physical loop in itB To ensure that if a device fails another device automatically take over for itC To allow management of all network devicesD To aggregate logical network groups together at one central point

考题 多选题Under which two circumstances should Spanning Tree Protocol be implemented? ()Ato ensure a loop-free topologyBto protect against user-side loopsCwhen a VLAN spans access layer switchesDfor the most deterministic and highly available network topologyEbecause of the risk of lost connectivity without Spanning Tree Protocol

考题 单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()A You should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.B You should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.C You should consider having the new server joined to an Active Directory domain.D You should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.

考题 多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard