网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which four Cisco Spanning Tree Protocol enhancements are supported with rapid per-VLAN Spanning-Tree plus?()
A

PortFast

B

UplinkFast

C

loop guard

D

root guard

E

BPDU guard

F

BackboneFast


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which four Cisco Spanning Tree Protocol enhancements are supported with rapid per-VLAN Spanning-Tree plus?()APortFastBUplinkFastCloop guardDroot guardEBPDU guardFBackboneFast” 相关考题
考题 Catalyst 3500(Cisco.[OS系统)中配置PortFast生成树可选功能的命令格式是——。A.set spanning—tree portfastmod/portenableB.set spanning-tree portfastmod/portenableC.spanning—tree portfast defaultD.set spanning—tree portfastmod/portdefault

考题 Under which two circumstances should Spanning Tree Protocol be implemented?() A. to ensure a loop-free topologyB. to protect against user-side loopsC. when a VLAN spans access layer switchesD. for the most deterministic and highly available network topologyE. because of the risk of lost connectivity without Spanning Tree Protocol

考题 Which four Cisco Spanning Tree Protocol enhancements are supported with rapid per-VLAN Spanning-Tree plus?() A. PortFastB. UplinkFastC. loop guardD. root guardE. BPDU guardF. BackboneFast

考题 Which command enables RSTP on a switch?() A. spanning-tree mode rapid-pvstB. spanning-tree uplinkfastC. spanning-tree backbonefastD. spanning-tree mode mst

考题 Which command enables RSTP on aswitch?() A.spanning-tree mode rapid-pvstB.spanning-tree uplinkfastC.spanning-tree backbonefastD.spanning-tree mode mst

考题 Which four Cisco priority Spanning Tree Protocol enhancements are supported with rapid per-VLAN Spanning Tree? ()A、 PortFastB、 UplinkFastC、 loop guardD、 root guardE、 BPDU guardF、 BackboneFast

考题 Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A、802.1XB、Cisco Temporal Key Integrity Protocol (CKIP)C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)D、Cisco Message Integrity Check (CMIC)E、One-Time Passwords (OTP)F、Advanced Encryption Standard (AES)

考题 Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()A、Uplink FastB、Port FastC、BPDU GuardD、Root Guard

考题 What Cisco technology protects against Spanning-Tree Protocol manipulation?()A、 Spanning tree protectB、 Root Guard and BPDU GuardC、 Unicast Reverse Path ForwardingD、 MAC spoof guardE、 Port Security

考题 Which three of the following network features are methods used to achieve high availability()A、Spanning Tree Protocol(STP)B、Delay reductionC、Hot Standby Routing Protocol(HSRP)D、Dynamic routing protocolsE、Quality of Service(QoS)F、Jitter management

考题 Spanning Tree Protocol calculates path cost based on which of these? ()A、 interface bandwidthB、 interface delayC、 interface bandwidth and delayD、 hop countE、 bridge priority

考题 Which command enables RSTP on a switch?()A、spanning-tree mode rapid-pvstB、spanning-tree uplinkfastC、spanning-tree backbonefastD、spanning-tree mode mst

考题 Under which two circumstances should Spanning Tree Protocol be implemented? ()A、 to ensure a loop-free topologyB、 to protect against user-side loopsC、 when a VLAN spans access layer switchesD、 for the most deterministic and highly available network topologyE、 because of the risk of lost connectivity without Spanning Tree Protocol

考题 Which four Cisco Spanning Tree Protocol enhancements are supported with rapid per-VLAN Spanning-Tree plus?()A、PortFastB、UplinkFastC、loop guardD、root guardE、BPDU guardF、BackboneFast

考题 What is the next state of initial in spanning-tree protocol?

考题 Which of the following specifications is a companion to the IEEE 802.1w Rapid Spanning Tree  Protocol (RSTP) algorithm, and warrants the use multiple spanning-trees? ()A、 IEEE 802.1s (MST)B、 IEEE 802.1Q (CST)C、 Cisco PVST+D、 IEEE 802.1d (STP)E、 None of the other alternatives apply

考题 Which command enhances the 802.1D convergence time on ports that are connected to hosts?()A、spanning-tree backbonefastB、spanning-tree uplinkfastC、spanning-tree portfastD、spanning-tree cost512

考题 Which two statements about the various implementations of STP are true?()A、mon Spanning Tree maintains a separate spanning-tree instance for each VLAN configured in the network.B、The Spanning Tree Protocol (STP) is an evolution of the IEEE 802.1w standard.C、Per-VLAN Spanning Tree (PVST) supports 802.1Q trunking.D、Per-VLAN Spanning Tree Plus(PVST+) is an enhancement to 802.1Q specification and is supported only on Cisco devices.E、Rapid Spanning Tree Protocol (RSTP) includes features equivalent to Cisco PortFast, UplinkFast, and BackboneFast for faster network reconvergence.F、Multiple Spanning Tree (MST) assumes one spanning-tree instance for the entire Layer 2 network, regardless of the multiple number of VLANs

考题 多选题Which four Cisco priority Spanning Tree Protocol enhancements are supported with rapid per-VLAN Spanning Tree? ()APortFastBUplinkFastCloop guardDroot guardEBPDU guardFBackboneFast

考题 多选题Which two components should be part of a security implementation plan?()Adetailed list of personnel assigned to each task within the planBa Layer 2 spanning tree design topologyCrollback guidelinesDplacing all unused access ports in VLAN 1 to proactively manage port securityEenabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis

考题 单选题Spanning Tree Protocol calculates path cost based on which of these? ()A  interface bandwidthB  interface delayC  interface bandwidth and delayD  hop countE  bridge priority

考题 多选题Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)()。Aamount of RAMBbridge priorityCIOS versionDIP addressEMAC addressFspeed of the links

考题 多选题Under which two circumstances should Spanning Tree Protocol be implemented? ()Ato ensure a loop-free topologyBto protect against user-side loopsCwhen a VLAN spans access layer switchesDfor the most deterministic and highly available network topologyEbecause of the risk of lost connectivity without Spanning Tree Protocol

考题 多选题Which two values are used by Spanning Tree Protocol to elect a root bridge?()Aamount of RAMBbridge priorityCIOS versionDIP addressEMAC addressFspeed of the links

考题 单选题What Cisco technology protects against Spanning-Tree Protocol manipulation?()A  Spanning tree protectB  Root Guard and BPDU GuardC  Unicast Reverse Path ForwardingD  MAC spoof guardE  Port Security

考题 单选题Spanning Tree Protocol calculates path cost based on which of these?()A interface bandwidthB interface delayC interface bandwidth and delayD hop countE bridge priority

考题 单选题Which of the following specifications is a companion to the IEEE 802.1w Rapid Spanning Tree  Protocol (RSTP) algorithm, and warrants the use multiple spanning-trees? ()A  IEEE 802.1s (MST)B  IEEE 802.1Q (CST)C  Cisco PVST+D  IEEE 802.1d (STP)E  None of the other alternatives apply