多选题Which two statements are true when the extended system ID feature is enabled? ()AThe BID is made up of the bridge priority value(two bytes) and bridge MAC address (six bytes).BThe BID is made up of the bridge priority (four bits), the system ID (12 bits), and a bridge MAC address (48 bits).CThe BID is made up of the system ID (six bytes) and bridge priority value (two bytes).DThe system ID value is the VLAN ID (VID).EThe system ID value is a unique MAC address allocated from a pool of MAC addresses assigned to the switch or module.FThe system ID value is a hex number used to measure the preference of a bridge in the spanning-tree algorithm.

多选题
Which two statements are true when the extended system ID feature is enabled? ()
A

The BID is made up of the bridge priority value(two bytes) and bridge MAC address (six bytes).

B

The BID is made up of the bridge priority (four bits), the system ID (12 bits), and a bridge MAC address (48 bits).

C

The BID is made up of the system ID (six bytes) and bridge priority value (two bytes).

D

The system ID value is the VLAN ID (VID).

E

The system ID value is a unique MAC address allocated from a pool of MAC addresses assigned to the switch or module.

F

The system ID value is a hex number used to measure the preference of a bridge in the spanning-tree algorithm.


参考解析

解析: 暂无解析

相关考题:

Which two statements about Oracle Direct Network File System (NFS) are true?() A. It bypasses the OS file system cache.B. A separate NFS interface is required for use across Linux, UNIX, and Windows platforms.C. It uses the operating system kernel NFS layer for user tasks and network communication modules.D. File systems need not be mounted by the kernel NFS system when being served through Direct NFS.E. Oracle Disk Manager can manage NFS on its own, without using the operating system kernel NFS driver.

Which two statements are true about the rescue configuration file?() A. It must include a root password.B. It is rollback file number 50, and you can recover it by issuing rollback 50.C. It is created by issuing request system configuration rescue save.D. It is updated automatically when you commit.

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.) A. Traffic is permitted from the trust zone to the untrust zone.B. Intrazone traffic in the trust zone is permitted.C. All traffic through the device is denied.D. The policy is matched only when no other matching policies are found.

Which two statements are true when configuring a domain-id? () A. The default OSPF domain-id is 127.0.0.1.B. In most cases, a domain-id must be configured.C. In most cases, you do not need to configure a domain-id.D. For a layer 3 VPN connecting multiple OSPF domains, configuring a domain-id can help control LSA translations.

Which two statements are true when the extended system ID feature is enabled? ()A、The BID is made up of the bridge priority value(two bytes) and bridge MAC address (six bytes).B、The BID is made up of the bridge priority (four bits), the system ID (12 bits), and a bridge MAC address (48 bits).C、The BID is made up of the system ID (six bytes) and bridge priority value (two bytes).D、The system ID value is the VLAN ID (VID).E、The system ID value is a unique MAC address allocated from a pool of MAC addresses assigned to the switch or module.F、The system ID value is a hex number used to measure the preference of a bridge in the spanning-tree algorithm.

Which statements is true about Predictive Failure Analysis (PFA) for System x servers?()A、PFA is embedded in selected server components and requires no action for being enabledB、PFA is available only when the Server Plus Pack is installed on the serverC、PFA is available only when a Virtual Media Key is presentD、PFA is available when the related setting is turned on in UEFI settings

Which two statements are true about the rescue configuration file?()A、It gets updated automatically when you commit.B、You need to create it by issuing request system configuration rescue save.C、It is rollback file number 50 and you can recover it by issuing rollback 50.D、You can load it by entering rollback rescue.

Which two statements about IS reachability TLV (TLV 2) and the extended IS reachability (TLV 22) are true?()A、TLV 22 supports wide metrics.B、TLV 2 is only used in Level 1 routers.C、TLV 22 displays the neighbor's extended areas.D、Only TLV 22 can support the inclusion of sub-TLVs.

You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

Which of the following statements are true?() A、 The equals() method determines if reference values refer to the same object.B、 The == operator determines if the contents and type of two separate objects match.C、 The equals() method returns true only when the contents of two objects match.D、 The class File overrides equals() to return true if the contents and type of two separate objects match.

Which two statements are true about the rescue configuration file?()A、It must include a root passwordB、It is roll back file number 50, and you can recover it by issuing rollback 50C、It is created by issuing request system configuration rescue saveD、It is updated automatically when you commit

Which two statements are true for a security policy? ()(Choose two.)A、It controls inter-zone traffic.B、It controls intra-zone traffic.C、It is named with a system-defined name.D、It controls traffic destined to the device's ingress interface.

Which two statements are true when configuring a domain-id?()A、The default OSPF domain-id is 127.0.0.1.B、It most cases, a domain-id must be configured.C、It most cases, you do not need to configure a domain-id.D、For a layer 3 VPN connecting multiple OSPF domains, configuring a domain-id can help control LSA translations.

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.

Which two statements are true regarding transactions in an Oracle database()A、Multiple transactions can use the same undo segment.B、A transaction is assigned an undo segment when it is started.C、More than one transaction cannot share the same extent in the undo tablespace.D、The transactions use system undo segment to store undo data if all the segments in the undo tablespaceare used.

Which two statements are true about record groups?()A、They are stored in the database. B、They are stored in local Forms memory. C、The type is specified explicitly at design time. D、The type is implied by when and how it is created.

多选题Which two statements are true regarding transactions in an Oracle database()AMultiple transactions can use the same undo segment.BA transaction is assigned an undo segment when it is started.CMore than one transaction cannot share the same extent in the undo tablespace.DThe transactions use system undo segment to store undo data if all the segments in the undo tablespaceare used.

多选题Which two statements are true about the rescue configuration file?()AIt gets updated automatically when you commit.BYou need to create it by issuing request system configuration rescue save.CIt is rollback file number 50 and you can recover it by issuing rollback 50.DYou can load it by entering rollback rescue.

多选题Which two statements are true for a security policy? ()(Choose two.)AIt controls inter-zone traffic.BIt controls intra-zone traffic.CIt is named with a system-defined name.DIt controls traffic destined to the device's ingress interface.

多选题Which two statements about Oracle Direct Network File System (NFS) are true?()AIt bypasses the OS file system cache.BA separate NFS interface is required for use across Linux, UNIX, and Windows platforms.CIt uses the operating system kernel NFS layer for user tasks and network communication modules.DFile systems need not be mounted by the kernel NFS system when being served through Direct NFS.EOracle Disk Manager can manage NFS on its own, without using the operating system kernel NFS driver.

多选题Which two statements are true when when a Coherence cluster member is lost ? ()ARemaining members recover by repartitioning the data across the remainig cluster members in parallel with normal request processingBSome latencies may be experienced due to higher priority of recoveryCIn flight operations may be lostDA system administrator must manually assist recovery of the lost data

多选题Which statements are true regarding system-partitioned tables?()AOnly a single partitioning key column can be specified.BAll DML statements must use partition-extended syntax.CThe same physical attributes must be specified for each partition.DUnique local indexes cannot be created on a system-partitioned table.ETraditional partition pruning and partitionwise joins are not supported on these tables.

多选题Which two statements are TRUE regarding Coherence Indexes ? ()Aindexes are maintained by cache entry ownesBan application should not suggest an index that another aplication had suggestedCindexes cannot be sortedDeach application using Coherence may suggest the same set of indexes when it starts

多选题Which two statements are true about the rescue configuration file?()AIt must include a root passwordBIt is roll back file number 50, and you can recover it by issuing rollback 50CIt is created by issuing request system configuration rescue saveDIt is updated automatically when you commit

多选题Which two statements are true about the rescue configuration file?()AIt must include a root password.BIt is roll back file number 50, and you can recover it by issuing rollback 50.CIt is created by issuing request system configuration rescue save.DIt is updated automatically when you commit

多选题Which of the following statements are true?()AThe equals() method determines if reference values refer to the same object.BThe == operator determines if the contents and type of two separate objects match.CThe equals() method returns true only when the contents of two objects match.DThe class File overrides equals() to return true if the contents and type of two separate objects match.

多选题Which two statements are true about record groups?()AThey are stored in the database.BThey are stored in local Forms memory.CThe type is specified explicitly at design time.DThe type is implied by when and how it is created.

多选题Which two statements are true when configuring a domain-id?()AThe default OSPF domain-id is 127.0.0.1.BIt most cases, a domain-id must be configured.CIt most cases, you do not need to configure a domain-id.DFor a layer 3 VPN connecting multiple OSPF domains, configuring a domain-id can help control LSA translations.