题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-10-18 03:43:27

[多选题]
Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)
A. amount of RAM
B. bridge priority
C. IOS version
D. IP address
E. MAC address
F. speed of the links

更多"[多选题]Which two values are used by S"的相关试题:

[多选题]
Which two link protocols are used to carry multiple VLANs over a single link? (Choose two.)
A. VTP
B. 802..1.q
C. IGP
D. ISL
E. 802..3.u
[多选题]
Which two protocols are used by bridges and/or switches to prevent loops in a layer 2. network? (Choosetwo.)
A. 802..1.d
B. VTP
C. 802..1.q
D. STP
E. SAP
[多选题]Which two features require the use of Host Profiles?
A. Host Customizations
B. shared storage
C. Auto Deploy
D. vRealize Suite
[多选题]
Which two Cisco IOS commands ,used in troubleshooting,can enable debug output to a remote location?(choose two)
A. no logging console
B. terminal monitor
C. logging host ip-address
D. snmp-server enable traps syslog
E. show logging | redirect flash:output.txt
[多选题]
Which two commands can be used to verify a trunk link configurationt status on a given cisco switch?(choose two)
A. show interfaces interface
B. show interfaces interface trunk
C. show interfaces interface switchport
D. show ip interface brief
E. show interfaces vlan
[多选题]
Which statements describe two of the benefits of VLAN Trunking Protocol? (Choose two.)
A. VTP allows routing between VLANs.
B. VTP allows a single switch port to carry information to more than one VLAN.
C. VTP allows physically redundant links while preventing switching loops.
D. VTP simplifies switch administration by allowing switches to automatically share VLAN configurationinformation.
E. VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.
F. VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.
[单选题]
Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding
State?
A. redundant
B. spanned
C. provisioned
D. converged
[多选题]
Which two are features of IPv6.?(choose two)
A. multicast
B. broadcast
C. allcast
D. podcast
E. anycast
[多选题]
Which two statements describe characteristics of IPv6. unicast addressing? (Choose two.)
A. Global addresses start with 200.0.::/3..
B. Link-local addresses start with FE00.:/12..
C. Link-local addresses start with FF00.::/10..
D. There is only one loopback address and it is ::1..
E. If a global address is assigned to an interface, then that is the only allowable address for the interface.
[单选题]21. There are other problems which I don’t propose to _____ at the moment.
A.go into
B.go around
C.go for
D.go up
[多选题]
Which two statements describe the advantages to the use of RIP over the use of OSPF?(choose two)
A. RIP requires less time to converge
B. RIP uses less bandwidth
C. RIP is less complex to configure
D. RIP demands fewer router resources
E. RIP has a more accurate metric
[多选题]Which two configurable options are available in Boot Options for a virtual machine?
A. Tools Upgrades
B. Encryption
C. Firmware
D. Force BIOS setup
[单选题]
Which command is used to enable CHAP authentication whit PAP as the fallback method on a serial
Interface?
A. (config-if)#authentication ppp chap fallback ppp
B. (config-if)#authentication ppp chap pap
C. (config-if)#ppp authentication chap pap
D. (config-if)#ppp authentication chap fallback ppp
[单选题]
Which command is used to display the collection of OSPF link states?
A. show ip ospf lsa database
B. show ip ospf link-state
C. show ip ospf neighbors
D. show ip ospf database
[多选题]
Which two statements are true regarding EIGRP? (Choose two.)
A. Passive routes are in the process of being calculated by DUAL.
B. EIGRP supports VLSM, route summarization, and routing update authentication.
C. EIGRP exchanges full routing table information with neighboring routers with every update.
D. If the feasible successor has a higher advertised distance than the successor route, it becomes the
Primary route.
E. A query process is used to discover a replacement for a failed route if a feasible successor is not
Identified from the current routing information.
[多选题]Which two statements describe the Cisco implementation of VLANs? (Choose two.)
A. VLAN 1. is the default Ethernet VLAN.
B. CDP advertisements are only sent on VLAN 100.2..
C. By default, the management VLAN is VLAN 100.5..
D. By default, the switch IP address is in VLAN 100.5..
E. VLAN 100.2. through 100.5. are automatically created and cannot be deleted.
[多选题]
Which two of these statements regarding RSTP are correct? (Choose two.)
A. RSTP cannot operate with PVST+.
B. RSTP defines new port roles.
C. RSTP defines no new port states.
D. RSTP is a proprietary implementation of IEEE 802..1.D STP.
E. RSTP is compatible with the original IEEE 802..1.D STP.
[多选题]
Which two statements about static NAT translations are true?(choose two)
A. They are always present in the NAT table.
B. They allow connection to be initiated from the outside.
C. They can be configured with access lists, to allow two or more connections to be initiated from theoutside.
D. They require no inside or outside interface markings because addresses are statically defined.
[多选题]
Which two commands correctly verify whether port security has been configured on port FastEthernet 0./12.
On a switch?(choose two)
A. SW1.#show swithport port-security interface FastEthernet 0./12.
B. SW1.# show swithport port-secure interface FastEthernet 0./12.
C. SW1.# show port-secure interface FastEthernet 0./12.
D. SW1.#show running-config

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

截图扫码使用小程序[完全免费查看答案]
请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码