多选题Which two statements correctly describe VTP?()ATransparent mode always has a configuration revision number of 0.BTransparent mode cannot modify a VLAN database.CClient mode cannot forward received VTP advertisements.DClient mode synchronizes its VLAN database from VTP advertisements.EServer mode can synchronize across VTP domains.

多选题
Which two statements correctly describe VTP?()
A

Transparent mode always has a configuration revision number of 0.

B

Transparent mode cannot modify a VLAN database.

C

Client mode cannot forward received VTP advertisements.

D

Client mode synchronizes its VLAN database from VTP advertisements.

E

Server mode can synchronize across VTP domains.


参考解析

解析: 暂无解析

相关考题:

Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet? (Select two answer choices.)A.Full-duplex Ethernet uses CSMA/CD to prevent collisions.B.Half-duplex Ethernet uses a loopback circuit to detect collisions.C.A full-duplex Ethernet card allows 20Mbps for data transmission.D.Full-duplex Ethernet makes use of two pairs of wires for data.E.An Ethernet hub can operate both half and full duplex simultaneously.

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?() A. Troubleshooting is more complicated.B. Service and switch modules are underutilized.C. Layer 2 adjacency is required with the servers that use this design.D. Layer 3 adjacency is required with the servers that use this design.E. Load balancing will always occur across both access layer uplinks.

Which two of these statements best describe the benefits of WPAv2? (Choose two.)()A、 SSID broadcast preventionB、 man-in-the-middle attack protectionC、 cost reduction through software upgrades in all existing hardwareD、 dynamic key generationE、 RF jamming prevention

You need to investigate a VTP problem between two Company switches. The lack of which two  prevents VTP information from propagating between switches?()A、A root VTP serverB、A trunk portC、VTP priorityD、VLAN 1E、None of the other alternatives apply

Which statement describe two of the benefits of VLAN Trunking Protocol?()A、VTP allows routing between VLANs.B、VTP allows a single switch port to carry information to more than one VLAN.C、VTP allows physically redundant links while preventing switching loops.D、VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.E、VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.F、VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.

Which two statements correctly describe VTP?()A、Transparent mode always has a configuration revision number of 0.B、Transparent mode cannot modify a VLAN database.C、Client mode cannot forward received VTP advertisements.D、Client mode synchronizes its VLAN database from VTP advertisements.E、Server mode can synchronize across VTP domains.

Which two statements correctly describe the relation between a data file and the logical databasestructures()A、An extent cannot spread across data files.B、A segment cannot spread across data files.C、A data file can belong to only one tablespace.D、A data file can have only one segment created in it.E、A data block can spread across multiple data files as it can consist of multiple operating system (OS) blocks.

Which two statements accurately describe an IBGP peering session?() (Choose two.)A、Peers are statically defined.B、Peers exist within the same AS.C、Peers must be directly connected to each other.D、Peers advertise routes learned from other IBGP neighbors.

Which two of these statements best describe the benefits of WPAv1? ()A、 SSID broadcast preventionB、 Improved mutual authenticationC、 Improved encryption through AESD、 Improved protection against sniffing initialization vectorsE、 RF jamming prevention

Which statements describe two of the benefits of VLAN Trunking Protocol?()A、VTP allows routing between VLANs.B、VTP allows a single switch port to carry information to more than one VLAN.C、VTP allows physically redundant links while preventing switching loops.D、VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.E、VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.F、VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.

Which two statements describe the advantages to the use of RIP over the use of OSPF?()A、RIP requires less time to convergeB、RIP uses less bandwidthC、RIP is less complex to configureD、RIP demands fewer router resourcesE、RIP has a more accurate metric

You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()A、It resembles a Layer 2 bridge.B、Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C、Inline interfaces which have no IP addresses cannot be detected.D、Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()A、Troubleshooting is more complicated.B、Service and switch modules are underutilized.C、Layer 2 adjacency is required with the servers that use this design.D、Layer 3 adjacency is required with the servers that use this design.E、Load balancing will always occur across both access layer uplinks.

Which two of these statements best describe fast secure roaming? (Choose two.)()  A、 available only in autonomous APsB、 available in autonomous and lightweight APsC、 a feature of WDS in autonomous APsD、 a feature of WDS in lightweight APsE、 requires at least one AP and one Wireless LAN Services Module

多选题Which two of these statements best describe fast secure roaming? (Choose two.)()Aavailable only in autonomous APsBavailable in autonomous and lightweight APsCa feature of WDS in autonomous APsDa feature of WDS in lightweight APsErequires at least one AP and one Wireless LAN Services Module

多选题Which two of these statements best describe the benefits of WPAv2? (Choose two.)()ASSID broadcast preventionBman-in-the-middle attack protectionCcost reduction through software upgrades in all existing hardwareDdynamic key generationERF jamming prevention

多选题Which two statements correctly describe UDLD? ()AUnidirectional link detection is achieved through monitoring STP BPDUs.BIt is recommended that it be enabled globally rather than on an individual port.CWhen an error is detected, normal mode will disable a port.DIt is recommended that it be enabled in normal mode.EIt is recommended that it be used with the loop guard feature.

多选题Which two of these statements best describe the benefits of WPAv1? ()ASSID broadcast preventionBImproved mutual authenticationCImproved encryption through AESDImproved protection against sniffing initialization vectorsERF jamming prevention

多选题Which two statements describe the advantages to the use of RIP over the use of OSPF?()ARIP requires less time to convergeBRIP uses less bandwidthCRIP is less complex to configureDRIP demands fewer router resourcesERIP has a more accurate metric

多选题Which two statements correctly describe the relation between a data file and the logical databasestructures()AAn extent cannot spread across data files.BA segment cannot spread across data files.CA data file can belong to only one tablespace.DA data file can have only one segment created in it.EA data block can spread across multiple data files as it can consist of multiple operating system (OS) blocks.

多选题Which two statements describe the criteria bandwidth detection uses to dynamically alter bandwidth allocation?()(Choose two.)AThroughput is raised as latency decreases.BThroughput is based on available bandwidth.CThroughput is lowered as latency decreases.DLatency is measured by SYNs returned for each metapacket.

多选题Which two of these correctly describe asymmetric routing and firewalls?()Aonly operational in routed modeBonly operational in transparent modeConly eight interfaces can belong to an asymmetric routing groupDoperational in both failover and non-failover configurationsEonly operational when the firewall has been configured for failover

多选题Which statements describe two of the benefits of VLAN Trunking Protocol?()AVTP allows routing between VLANs.BVTP allows a single switch port to carry information to more than one VLAN.CVTP allows physically redundant links while preventing switching loops.DVTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.EVTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.FVTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.

多选题Which two statements correctly describe characteristics of the PortFast feature? ()ASTP will be disabled on the port.BPortFast can also be configured on trunk ports.CPortFast is required to enable port-based BPDU guard.DPortFast is used for both STP and RSTP host ports.EPortFast is used for STP-only host ports.