单选题When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?()Awhen all switches have the same BID as the root switchBwhen all switches have received the MAC address of each neighboring switchCwhen every enabled switch port has been assigned a unique identifierDwhen every operating switch port is in either the blocking or forwarding stateEwhen all switches are in either client, server, or transparent mode

单选题
When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?()
A

when all switches have the same BID as the root switch

B

when all switches have received the MAC address of each neighboring switch

C

when every enabled switch port has been assigned a unique identifier

D

when every operating switch port is in either the blocking or forwarding state

E

when all switches are in either client, server, or transparent mode


参考解析

解析: 暂无解析

相关考题:

You need to decide on which trunking method to implement in the Ezonexam network. What is a characteristic of ISL and 802.1q frame. tagging in a switched LAN environment?A.They are used to find the best path through a network.B.They allow the exchange of filtering tables.C.They specify different implementations of the Spanning-Tree Protocol.D.They allow the exchange of routing tablesE.They provide inter-switch VLAN communication.

When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?A.when all switches have the same BID as the root switchB.when all switches have received the MAC address of each neighboring switchC.when every enabled switch port has been assigned a unique identifierD.when every operating switch port is in either the blocking or forwarding stateE.when all switches are in either client, server, or transparent mode

Under which two circumstances should Spanning Tree Protocol be implemented?() A. to ensure a loop-free topologyB. to protect against user-side loopsC. when a VLAN spans access layer switchesD. for the most deterministic and highly available network topologyE. because of the risk of lost connectivity without Spanning Tree Protocol

Which command enables RSTP on a switch?() A. spanning-tree mode rapid-pvstB. spanning-tree uplinkfastC. spanning-tree backbonefastD. spanning-tree mode mst

Which command enables RSTP on aswitch?() A.spanning-tree mode rapid-pvstB.spanning-tree uplinkfastC.spanning-tree backbonefastD.spanning-tree mode mst

Which spanning-tree command would cause a PortFast-enabled interface to lose its PortFast-operational status and disable BPDU filtering if it receives BPDUs?()A、spanning-tree guard rootB、spanning-tree portfast bpduguard defaultC、spanning-tree bpduguard enableD、spanning-tree bpdufilter enableE、spanning-tree portfast bpdufilter default

When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?()A、when all switches have the same BID as the root switchB、when all switches have received the MAC address of each neighboring switchC、when every enabled switch port has been assigned a unique identifierD、when every operating switch port is in either the blocking or forwarding stateE、when all switches are in either client, server, or transparent mode

What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()A、To protect the network in case someone inadvertently creates a physical loop in itB、To ensure that if a device fails another device automatically take over for itC、To allow management of all network devicesD、To aggregate logical network groups together at one central point

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard

What is the purpose of the spanning-tree algorithm in a switched LAN?()A、To provide a monitoring mechanism for networks in switched environments.B、To manage VLANs across multiple switches.C、To prevent switching loops in networks with redundant switched paths.D、To segment a network into multiple collision domains.E、To prevent routing loops in networks.

What is the result of entering the command spanning-tree loopguard default?()A、The command enables both loop guard and root guard.B、The command changes the status of loop guard from the default of disabled to enabled.C、The command activates loop guard on point-to-multipoint links in the switched network.D、The command will disable EtherChannel guard.

What is a characteristic of ISL and 802.1q frame tagging in a switched LAN environment?()A、They are used to find the best path through a network.B、They allow the exchange of filtering tables.C、They specify different implementations of the Spanning-Tree Protocol.D、They allow the exchange of routing tablesE、They provide inter-switch VLAN communication.

In a switched LAN network, what is the Spanning-Tree algorithm used for?()A、It is used to provide a mechanism for routing updates in switched environments.B、It is used to prevent routing loops in networks with redundant routes.C、It is used to prevent switching loops in networks with redundant switched routes.D、It is used to manage, the addition, deletion, and naming of VLANs across multiple switches.E、It is used to segment a network into multiple collision domains.F、None of the above.G、All of the above are functions of STP.

pany uses MSTP within their switched LAN.  What is the main purpose of Multiple Instance  Spanning Tree Protocol (MSTP)?()A、 To enhance Spanning Tree troubleshooting on multilayer switchesB、 To reduce the total number of spanning tree instances necessary for a particular topology C、 To provide faster convergence when topology changes occur in a switched networkD、 To provide protection for STP when a link is unidirectional and BPDUs are being sent but not  receivedE、 None of the other alternatives apply

You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining thataccess to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue,and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely thecause of this issue?()A、routing issueB、denial-of-service attackC、MAC floodingD、spanning-tree recalculationE、Layer 2 loopF、ARP spoofing attack

Which command enables RSTP on a switch?()A、spanning-tree mode rapid-pvstB、spanning-tree uplinkfastC、spanning-tree backbonefastD、spanning-tree mode mst

Under which two circumstances should Spanning Tree Protocol be implemented? ()A、 to ensure a loop-free topologyB、 to protect against user-side loopsC、 when a VLAN spans access layer switchesD、 for the most deterministic and highly available network topologyE、 because of the risk of lost connectivity without Spanning Tree Protocol

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard

Which command enhances the 802.1D convergence time on ports that are connected to hosts?()A、spanning-tree backbonefastB、spanning-tree uplinkfastC、spanning-tree portfastD、spanning-tree cost512

Which two statements about the various implementations of STP are true?()A、mon Spanning Tree maintains a separate spanning-tree instance for each VLAN configured in the network.B、The Spanning Tree Protocol (STP) is an evolution of the IEEE 802.1w standard.C、Per-VLAN Spanning Tree (PVST) supports 802.1Q trunking.D、Per-VLAN Spanning Tree Plus(PVST+) is an enhancement to 802.1Q specification and is supported only on Cisco devices.E、Rapid Spanning Tree Protocol (RSTP) includes features equivalent to Cisco PortFast, UplinkFast, and BackboneFast for faster network reconvergence.F、Multiple Spanning Tree (MST) assumes one spanning-tree instance for the entire Layer 2 network, regardless of the multiple number of VLANs

In which of the following topologies could the failure of one machine cause the entire network tostop functioning?()A、MeshB、Token ringC、StarD、Spanning tree

单选题What is the result of entering the command spanning-tree loopguard default?()AThe command enables both loop guard and root guard.BThe command changes the status of loop guard from the default of disabled to enabled.CThe command activates loop guard on point-to-multipoint links in the switched network.DThe command will disable EtherChannel guard.

单选题When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?()Awhen all switches have the same BID as the root switchBwhen all switches have received the MAC address of each neighboring switchCwhen every enabled switch port has been assigned a unique identifierDwhen every operating switch port is in either the blocking or forwarding stateEwhen all switches are in either client, server, or transparent mode

单选题What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()ATo protect the network in case someone inadvertently creates a physical loop in itBTo ensure that if a device fails another device automatically take over for itCTo allow management of all network devicesDTo aggregate logical network groups together at one central point

单选题pany uses MSTP within their switched LAN.  What is the main purpose of Multiple Instance  Spanning Tree Protocol (MSTP)?()A To enhance Spanning Tree troubleshooting on multilayer switchesB To reduce the total number of spanning tree instances necessary for a particular topology C To provide faster convergence when topology changes occur in a switched networkD To provide protection for STP when a link is unidirectional and BPDUs are being sent but not  receivedE None of the other alternatives apply

多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard

单选题What is a characteristic of ISL and 802.1q frame tagging in a switched LAN environment?()AThey are used to find the best path through a network.BThey allow the exchange of filtering tables.CThey specify different implementations of the Spanning-Tree Protocol.DThey allow the exchange of routing tablesEThey provide inter-switch VLAN communication.

单选题What is the purpose of the spanning-tree algorithm in a switched LAN?()ATo provide a monitoring mechanism for networks in switched environments.BTo manage VLANs across multiple switches.CTo prevent switching loops in networks with redundant switched paths.DTo segment a network into multiple collision domains.ETo prevent routing loops in networks.