Exhibit:
You work as a network administrator at. You study the exhibit carefully.
Which configuration on the HSRP neighboring device ensures that it becomes the active HSRP device in the event that port fa1/1 on 1 goes down? ()
A. 2(config-if)#ip address 10.10.10.2 255.255.255.0 2(config-if)#standby 1 priority 200 2(config-if)#standby 1 ip 10.10.10.10
B. 2(config-if)# ip address 10.10.10.2 255.255.255.0 2(config-if)#standby 1 priority 195 2(config-if)#standby 1 preempt 2(config-if)#standby 1 ip 10.10.10.10
C. 2(config-if)# ip address 10.10.10.2 255.255.255.0 2(config-if)#standby 1 priority 190 2(config-if)#standby 1 ip 10.10.10.10 2(config-if)#standby 1 track interface fa 1/1
D. 2(config-if)# ip address 10.10.10.2 255.255.255.0 2(config-if)#standby 1 priority 200 2(config-if)#standby 1 preempt 2(config-if)#standby 1 ip 10.10.10.10 2(config-if)#standby 1 track interface fa 1/1
您可能感興趣的試卷
你可能感興趣的試題
You have configured the "config network webmode enable" command on a Cisco device.
What is the purpose of this command? ()
A.To allow HTTP access to the WLAN controller
B.To allow SSH access to the CLI of the WLAN controller
C.To allow SSL access to the CLI of the WLAN controller
D.To allow HTTPS access to the WLAN controller
E.None of the other alternatives apply
A.When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.
B.The voice VLAN feature is enabled by default.
C.The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.
D.The default CoS value is 1 for incoming voice and data traffic.
You work as a network engineer for. You study the exhibit carefully.
What type of attack would be mitigated by this configuration?()
A.CDP manipulation
B.VLAN hopping
C.MAC spoofing
D.MAC flood attack
E.ARP spoofing
F.spanning tree compromises
You want to enhance the security within the LAN and prevent VLAN hopping.
What two steps can be taken to help prevent this?()
A.Enable BPD guard
B.Disable CDP on ports where it is not necessary
C.Place unused ports in a common unrouted VLAN
D.Prevent automatic trunk configuration
E.Implement port security
The network administrator has enabled BPDU guard on the LAN.
Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()
A.BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network.
B.BPDU guard can guarantee proper selection of the root bridge.
C.BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.
D.BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.
E.None of the other alternatives apply
最新試題
Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()
During routine maintenance, G1/0/1 on DS1 was shutdown. All other interface were up. DS2 became the active HSRP device for Vlan101 as desired. However, after G1/0/1 on DS1 was reactivated. DS1 did not become the active HSRP device as desired. What need to be done to make the group for Vlan101 function properly ? ()
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()
What two things will occur when an edge port receives a BPDU?()
DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()
During routine maintenance, it became necessary to shutdown G1/0/1 on DS1 and DS2. All other interface were up. During this time, DS1 became the active device for Vlan104’s HSRP group. As related to Vlan104’s HSRP group. What can be done to make the group function properly ? ()
Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivity throughout the network, Front Line users have been complaining that they experience slower network performance when accessing the server farm than the Reception office experiences. Based on the exhibit, which two statements are true?()
Refer to the exhibit. What does the command channel-group 1 mode desirable do? ()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
Which two statements are true when the extended system ID feature is enabled? ()