Each port that is configured to use LACP has an LACP port priority. Which statements are true about LACP port priority? ()A、 Port priority value can be configured between 1 and 65535.B、 A higher port priority value means a higher priority of LACP.C、 Port priority can be configured so that specific links can be chosen as active links rather than the hot standby links within the port channel.D、 LACP uses the port priority with the port number to form the port identifier.E、 LACP Port priority default value should always be changed

Each port that is configured to use LACP has an LACP port priority. Which statements are true about LACP port priority? ()

  • A、 Port priority value can be configured between 1 and 65535.
  • B、 A higher port priority value means a higher priority of LACP.
  • C、 Port priority can be configured so that specific links can be chosen as active links rather than the hot standby links within the port channel.
  • D、 LACP uses the port priority with the port number to form the port identifier.
  • E、 LACP Port priority default value should always be changed

相关考题:

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?A. path costB. lowest port MAC addressC. VTP revision numberD. highest port priority numberE. port priority number and MAC addressF. None of the above

On a 3-port CT3 card, how many HDLC controllers does each port support?() A.AB.BC.CD.D

Which of the following is required if ports from VLANs on two separate switches need to broadcastto each other?() A. Port mirroringB. VPNC. TrunkingD. Port authentication

Anetworkadministratormustconfigure200switchportstoaccepttrafficfromonlythecurrentlyattachedhostdevices.WhatwouldbethemostefficientwaytoconfigureMAC-levelsecurityonalltheseports?() A.Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B.Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C.Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D.Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

The transfer procedures required to be followed on tankers shall contain ______.A.A list of each port of dischargeB.A line diagram of the vessel's transfer pipingC.A current crew listD.The duties by name of each person in charge required for each transfer operation

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC addressC、VTP revision numberD、highest port priority numberE、path cost

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、pathcost

What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A、path costB、lowest port MAC addressC、VTP revision numberD、highest port priority numberE、port priority number and MAC address

Which three are valid methods to monitor and trend SAN port channels with DCNM?()A、 use summary view in the device managerB、 from the DCNM-SAN client, view ISLs in real time from the Performance drop-down listC、 for each port channel, select Monitor ContinuallyD、 configure traps for each port channel to utilize RMONE、 set up flows with the DCNM-SAN client and use the Performance Manager web client for performance collections

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、path cost

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices.What would be the most efficient way to configure MAC-level security on all these ports? ()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

When ordering switches for a new building, which of the following is the BEST way for the technician to determine the number of switches to put in each network closet?()A、Review the architectural plans to see how many drops go to each closet.B、Count the number of rooms near each closet and standardize eight drops per room.C、Wireless is the new standard and no network switches will be needed in the building,D、Count the number of phone ports and configure two network ports for each phone port.

Which of the following is required if ports from VLANs on two separate switches need to broadcastto each other?()A、Port mirroringB、VPNC、TrunkingD、Port authentication

A pSeries technical specialist is configuring the network adapters for an HACMP cluster.  The plan is to use a four-port Ethernet adapter with IPAT via IP aliasing for the two service IP labels.  Which of the following would be a critical concern with the proposed configuration?()A、A four-port adapter is not supported.B、The four-port adapter is a single point of failure.C、There should be a spare port for each service IP label.D、The four-port adapter could be a potential performance bottleneck.

A media customer has an IBM BladeCenter E with ten HS22 Blade server installed. Currently only one Ethernet port is available for each server. What is required to enable the second port on eachserver?()A、Fiber Channel Switch ModuleB、Gb Ethernet expansion cardC、Myrinet Cluster expansion cardD、Ethernet Switch Module

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

多选题Each port that is configured to use LACP has an LACP port priority. Which statements are true about LACP port priority? ()APort priority value can be configured between 1 and 65535.BA higher port priority value means a higher priority of LACP.CPort priority can be configured so that specific links can be chosen as active links rather than the hot standby links within the port channel.DLACP uses the port priority with the port number to form the port identifier.ELACP Port priority default value should always be changed

单选题Prior to being able to sail in a US port,each vessel that carries grain in bulk must have a certificate of loading issued by the().AAmerican Bureau of ShippingBLloyds of LondonCNational Cargo BureauDUS Salvage

单选题Each lifebuoy shall be marked in block capitals of the Roman alphabet with()of the ship.Athe call sign and nameBthe official number and nameCthe port of registry and nameDthe port of registry and official number

单选题What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()Apath costBlowest port MAC addressCVTP revision numberDhighest port priority numberEport priority number and MAC address

单选题A pSeries technical specialist is configuring the network adapters for an HACMP cluster.  The plan is to use a four-port Ethernet adapter with IPAT via IP aliasing for the two service IP labels.  Which of the following would be a critical concern with the proposed configuration?()AA four-port adapter is not supported.BThe four-port adapter is a single point of failure.CThere should be a spare port for each service IP label.DThe four-port adapter could be a potential performance bottleneck.

单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in aspanning-tree topology?()Alowest port MAC addressBport priority number and MAC address.CVTP revision numberDhighest port priority number.Epath cost

单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()Alowest port MAC addressBport priority number and MAC address.CVTP revision numberDhighest port priority number.Epathcost

单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()Alowest port MAC addressBport priority number and MAC addressCVTP revision numberDhighest port priority numberEpath cost

单选题Two vessels are abreast of each other and passing port to port in a confined waterway. What should you expect as your bow approaches the screws of the other vessel? ()AYour speed will significantly increaseBYour draft will significantly decreaseCYour bow will sheer towards the other vesselDYour bow will sheer away from the other vessel