A.The originator of the TCN immediately floods this information through the network. B.The TCN propagation is a two step process. C.A TCN is generated and sent to the root bridge. D.The root bridge must flood this information throughout the network.
单项选择题Refer to the exhibit. Catalyst R is the root bridge for both VLAN 1 and VLAN 2.What is the easiest way to load-share traffic across both trunks and maintain redundancy in case a link fails,without using any type of EtherChannel link-bundling?()
A. Increase the root bridge priority (increasing the numerical priority number) for VLAN 2 on Catalyst D so that port D2 becomes the root port on Catalyst D for VLAN 2. B. Decrease the port priority on R2 for VLAN 2 on Catalyst R so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1. C. Decrease the path cost on R2 on Catalyst R for VLAN 2 so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1. D. Increase the root bridge priority (decreasing the numerical priority number) for VLAN 2 on Catalyst R so that R2 becomes the root port on Catalyst D for VLAN 2.
单项选择题Whichstatementistrueaboutloopguard?()
A.Loop guard only operates on interfaces that are considered point-to-point by the spanning tree. B.Loop guard only operates on root ports. C.Loop guard only operates on designated ports. D.Loop guard only operates on edge ports.
单项选择题WhywouldaroguehostthatisrunningaDHCPserveronacampusLANnetworkpresentasecurityrisk?()
A.It may allocate IP addresses from an unknown subnet to the users. B.All multicast traffic can be sniffed by using the DHCP multicast capabilities. C.The CPU utilization of the first hop router can be overloaded by exploiting DHCP relay open ports. D.A potential man-in-the-middle attack can be used against the clients.
单项选择题TheclassicSpanningTreeProtocol(802.1D1998)useswhichsequenceofvariablestodeterminethebestreceivedBPDU?()
A. 1) lowest root bridge id,2)lowest sender bridge id,3)lowest port id,4)lowest root path cost B. 1) lowest root path cost,2)lowest root bridge id,3)lowest sender bridge id,4)lowest sender port id C. 1) lowest root bridge id,2)lowest sender bridge id,3)lowest root path cost 4)owest sender port id D. 1) lowest root bridge id,2)lowest root path cost,3)lowest sender bridge id,4)lowest sender port id
单项选择题WhichofthesebestdescribestheactionstakenwhenaVTPmessageisreceivedonaswitchconfiguredwiththeVTPmode transparent ?()
A. VTP updates are ignored and forwarded out all ports. B. VTP updates are ignored and forwarded out trunks only. C. VTP updates are made to the VLAN database and are forwarded out trunks only. D. VTP updates are ignored and are not forwarded.