Exhibit:
You work as a network administrator at . You study the exhibit carefully.
What information can be drawn from the output?()
A.Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a superior root bridge parameter, but traffic is still forwarded across the ports.
B.Interfaces FastEthernet3/1 and FastEthernet3/2 are candidate for becoming the STP root port, but neither can realize that role until BPDUs with a superior root bridge parameter are no longer received on at least one of the interfaces.
C.Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a superior root bridge parameter and no traffic is forwarded across the ports.Once inaccurate BPDUs have been stopped, the interfaces automatically recover and resume normal operation.
D.Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a superior root bridge parameter and no traffic is forwarded across the ports.Once inaccurate BPDUs have been stopped, the interfaces will need to be administratively shut down, and brought back up, to resume normal operation.
您可能感興趣的試卷
你可能感興趣的試題
Exhibit:
You work as a network administrator at . You study the exhibit carefully.
What can be drawn about VLANs 200 and 202 from the exhibit?()
A.VLAN 200 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 202 carries traffic between community ports and to promiscuous ports.
B.VLAN 200 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 202 carries traffic from isolated ports to a promiscuous port.
C.VLAN 202 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 200 carries traffic from isolated ports to a promiscuous port.
D.VLAN 202 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 200 carries traffic between community ports and to promiscuous ports.
A.Place unused ports in a common VLAN.
B.Implement private VLANs.
C.Implement DHCP snooping.
D.Implement port security.
E.Implement VLAN access maps.
Study the exhibit below carefully:
When a profile is configured for a user on the network in the Aironet Desktop Utility, which security option permits the configuration of AES (Advanced Encryption Standard) and Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling?()
A.Pre-Shared Key (Static WEP)
B.WPA/WPA2/CCKM
C.802.1x
D.WPA/WPA2 Passphrase
E.None of the other alternatives apply
A.A wireless repeater is an access point that is not connected to the wired LAN.
B.The repeater feature is only available in lightweight access point topologies.
C.The SSID of the root access point must be configured on the repeater access point.
D.This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.
E.This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.
F.To avoid interference, the repeater access point must use a different channel from what the root access point uses.
You need to configure the WLAN client utility on a new machine.
Which two of the following are true regarding this utility? ()
A.The Aironet Desktop Utility (ADU) can be used to enable or disable the adapter radio and to configure LEAP authentication with dynamic WEP.
B.In Windows XP environment, a client adapter can only be configured and managed with the Microsoft Configuration Manager.
C.The Microsoft Wireless Configuration Manager can be configured to display the Aironet System Tray Utility (ASTU) icon in the Windows system tray.
D.The Cisco Aironet Desktop Utility (ADU) and the Microsoft Wirelss Configuration Manager can both be enabled at the same time to setup WLAN client cards.
最新試題
What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive a BPDU from its neighbor for three consecutive hello time intervals?()
Which statement is correct about the use of the virtual interface on a WLC ?()
Refer to the exhibit. What does the command channel-group 1 mode desirable do? ()
Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()
Which two statements about the various implementations of STP are true?()
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()
Which router redundancy protocol cannot be configured for interface tracking?()
How are STP timers and state transitions affected when a topology change occurs in an STP environment?()
Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()
Refer to the exhibit. For what purpose is the command show ip cef used?()