A. path cost
B. lowest port MAC address
C. VTP revision number
D. highest port priority number
E. port priority number and MAC address
您可能感興趣的試卷
你可能感興趣的試題
A. It is used with the OSPF priority values to determine which OSPF router will become the DR or BOR in a point-to-point network
B. It is used with the OSPF priority values to determine which interface will be used to form a neighbor relationship with another OSPF router
C. It is used with the OSPF priority values to determine which router will become the DR or BOR in a multi access network
D. It is used to determine which interfaces will send Hello packets to neighboring OSPF routers
A. Show vlan
B. Show mac-address-table
C. Show vtp status
D. show spanning-tree root
E. show ip interface brief
A. A configured router prompts for a password
B. A configured router goes to the privileged mode prompt
C. An un configured router goes into the setup dialog
D. An un configured router goes to the enable mode prompt
A. when all switches have the same BID as the root switch
B. when all switches have received the MAC address of each neighboring switch
C. when every enabled switch port has been assigned a unique identifier
D. when every operating switch port is in either the blocking or forwarding state
E. when all switches are in either client, server, or transparent mode
A. a serial cable with a V.35 to RJ45 adapter
B. a CSU/DSU
C. an external ISDN TA and NT1
D. The non-modular router cannot connect to an ISDN service. The network administrator must purchase a modular router with an ISDN BRI-U card.
最新試題
Which of the following contribute to congestion on an Ethernet network?()
How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
Which connections allow the use of full-duplex Ethernet?()
Which of the following host addresses are member of networks that can be routed across the public Internet? ()
Which of the following options lists the steps in PPP session establishment in the correct order?()
Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()
What is the purpose of typing o/r 0x2142 during a password recover procedure on a 2500 series router?()
Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()
Which of the following describe router functions?()