单选题After configuring FabricPath, the following appears in the syslog: %STP-2-L2GW_BACKBONE_BLOCK: L2 Gateway Backbone port inconsistency blocking port port-channel100 on VLAN0010. What is the cause of this message? ()A STP must be disabled; message indicates that STP is enabled.B STP is misconfigured; root guard must be disabled.C An inferior BPDU is received on a Cisco FabricPath edge port.D A superior BPDU is received on a Cisco FabricPath edge port.
单选题
After configuring FabricPath, the following appears in the syslog: %STP-2-L2GW_BACKBONE_BLOCK: L2 Gateway Backbone port inconsistency blocking port port-channel100 on VLAN0010. What is the cause of this message? ()
A
STP must be disabled; message indicates that STP is enabled.
B
STP is misconfigured; root guard must be disabled.
C
An inferior BPDU is received on a Cisco FabricPath edge port.
D
A superior BPDU is received on a Cisco FabricPath edge port.
参考解析
解析:
暂无解析
相关考题:
The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()A. Verity full system functionalityB. Identify the main problem and question the userC. Document their findings, actions, and outcomesD. Escalate the issue to upper management
An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router
Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances
The laydays according to the Charter Party commence at 0800 hrs on 13th June,and will expire at 1600 hrs on 19th June,after that the vessel will be on demurrage.A.This kind of wording usually appears in ______.B.a ship's certificateC.a Note of Sea ProtestD.a Notice of Readiness
When can routine communications be resumed on a frequency or channel on which radio silence has been imposed ________.A.After determining that the frequency or channel appears to be no longer in useB.After determining that geographic distance from the distress situation will prohibit any other signal from interfering with emergency communicationsC.After the Rescue Coordination Center transmits a message on the frequency or channel being used for emergency communications stating that such traffic has concludedD.Routine communications can resume if,in the Master's opinion,communications on that frequency or channel will not interfere with emergency communications
After configuring FabricPath, the following appears in the syslog: %STP-2-L2GW_BACKBONE_BLOCK: L2 Gateway Backbone port inconsistency blocking port port-channel100 on VLAN0010. What is the cause of this message? () A、 STP must be disabled; message indicates that STP is enabled.B、 STP is misconfigured; root guard must be disabled.C、 An inferior BPDU is received on a Cisco FabricPath edge port.D、 A superior BPDU is received on a Cisco FabricPath edge port.
An administrator notes that after a recent power outage, some open files were corrupted on one affected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()A、The server's memoryB、The server's RAID controller batteryC、The server's processorD、The server's NIC teaming configuration
The system administrator did a new install of AIX on a server about a week ago. The system was not rebooted after the installation. CDE is running on this system as is TCPIP. The system administrator has started configuring the system percompany directives. The power cable was inadvertently disconnected from the wall causing the sever to lose power. Upon reboot, the system appears to hang during log in from the console or from Xterminals. Which of the following is the most probable cause?()A、It is a hardware problem caused by the power failure.B、There is a network problem, most probably with name resolution.C、Sine the system was never rebooted, devices are marked defined instead of available and need to be activated.D、Some filesets may be marked as broken and need to be reinstalled.
A user reports that after configuring the BIOS to boot to the hard drive first, the system still tries to boot from the optical drive. Which of the following is the MOST likely cause?()A、Optical driveB、Power supplyC、CMOS batteryD、CD-ROM disk
The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()A、Verity full system functionalityB、Identify the main problem and question the userC、Document their findings, actions, and outcomesD、Escalate the issue to upper management
Which of these phase comprises post-project support activities: activities that happen after a project is successfully implemented and handed off? Select exactly 1 answer(s) from the following:()。A、planB、prepareC、operateD、implement
Under which of the following circumstances would a technician use IPCONFIG /RENEW?()A、After an unsuccessful rebootB、If a user’s IP address has been spoofedC、After using IPCONFIG /RELEASED、If the computer has an ARP address conflict
A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer. Which of the following would be another way for the user to send the Remote Assistance invitation? ()A、Configuring the Windows Firewall exceptions.B、Using Windows Messenger.C、Configuring My Network Places.D、Using Internet Explorer.
After Microsoft Windows boots, a message appears stating that a service failed to start. Which of the following can be used to find more information about this error?()A、Disk ManagerB、Control PanelC、Start MenuD、Event Viewer
The technician is repairing a PC which appears to have a failing RAM module. After replacing the module, the extra memory still is not registering. Which of the following is MOST likely the issue?()A、Jumper settings are incorrectB、The RAM module is defectiveC、The memory slot is defectiveD、CMOS needs to be flashed
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router
Shortly after the Press Ctrl-Alt-Delete to login screen appears in Windows XP, a user gets the error One or more services failed to start. Which of the following locations could be accessed to identify the service that did not start and attempt to start the service manually?()A、Computer ManagementB、Services MMC Plug-inC、Event LogD、Task ManagerE、System Configuration Utility
An administrator is configuring a new cluster and has a requirement for a notification to be generated if the /tmp File System becomes greater than 90% full. Which of the following PowerHA components will support theadministrator’s requirement?()A、Pre-defined EventsB、User-defined EventsC、Remote notification methodsD、The integration between RMC and WebSM
When choosing a hostname, which of the following naming conventions is most important to consider?()A、The name is unique globallyB、The name is unique in a specified domainC、The name is not named after a person, place or thingD、The name has special meaning to the machine’s function
单选题The system administrator did a new install of AIX on a server about a week ago. The system was not rebooted after the installation. CDE is running on this system as is TCPIP. The system administrator has started configuring the system percompany directives. The power cable was inadvertently disconnected from the wall causing the sever to lose power. Upon reboot, the system appears to hang during log in from the console or from Xterminals. Which of the following is the most probable cause?()AIt is a hardware problem caused by the power failure.BThere is a network problem, most probably with name resolution.CSine the system was never rebooted, devices are marked defined instead of available and need to be activated.DSome filesets may be marked as broken and need to be reinstalled.
问答题You are looking for one word in this paragraph. The word appears only once, its first letter is the eighth letter which appears after a certain vowel and the same vowel is the fifth letter before its last letter.
多选题Shortly after the Press Ctrl-Alt-Delete to login screen appears in Windows XP, a user gets the error One or more services failed to start. Which of the following locations could be accessed to identify the service that did not start and attempt to start the service manually?()AComputer ManagementBServices MMC Plug-inCEvent LogDTask ManagerESystem Configuration Utility
单选题The technician is repairing a PC which appears to have a failing RAM module. After replacing the module, the extra memory still is not registering. Which of the following is MOST likely the issue?()AJumper settings are incorrectBThe RAM module is defectiveCThe memory slot is defectiveDCMOS needs to be flashed
单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed. Some of ABC.com’s workstations have Windows 7 installed, while the rest have Windows 8 installed. After installing a new Windows Server 2012 R2 computer in the ABC.com domain, you configure it to run the File and Storage Services server role.You are instructed to create a shared folder on the new server, and configure the use of Previous Versions for restoring files located in the shared folder. Which of the following actions should you take?()AYou should consider configuring the Shadow Copies settings on the new server.BYou should consider configuring the Snapshot settings on the new server.CYou should consider configuring the Background Copy settings on the new server.DYou should consider configuring the Permission settings on the new server.
多选题When configuring the messaging system, which of the following are parameters of the e-mail transport? ()ALocationBProtocolCModeDWeb AddressEHost
单选题An administrator notes that after a recent power outage, some open files were corrupted on one affected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()AThe server's memoryBThe server's RAID controller batteryCThe server's processorDThe server's NIC teaming configuration