What are two key characteristics of VTP? ()A、VTP messages are sent out all switch-switch connections.B、VTP L2 messages are communicated to neighbors using CDP.C、VTP manages addition, deletion, and renaming of VLANs 1 to 4094.D、VTP pruning restricts flooded traffic, increasing available bandwidth.E、VTP V2 can only be used in a domain consisting of V2 capable switches.F、VTP V2 performs consistency checks on all sources of VLAN information.
What are two key characteristics of VTP? ()
- A、VTP messages are sent out all switch-switch connections.
- B、VTP L2 messages are communicated to neighbors using CDP.
- C、VTP manages addition, deletion, and renaming of VLANs 1 to 4094.
- D、VTP pruning restricts flooded traffic, increasing available bandwidth.
- E、VTP V2 can only be used in a domain consisting of V2 capable switches.
- F、VTP V2 performs consistency checks on all sources of VLAN information.
相关考题:
–()? – No, it’s not very far at all, only two blocks. (A)Is it too far to walk?(B) Do you know where is the public bathroom?(C) What do I do after walking two blocks along the street?(D) What’ s the best way to the public bathroom?
---“_________” ---“Two degrees on starboard”A.What rudder?B.How is the heading?C.How answer?D.What course?
What are two types of WebView monitoring statistics on the WX/WXC platforms?() (Choose two.) A.LANB.QoSC.trafficD.IPSec
Before a Diffie-Hellman exchange may begin, the two parties involved must agree on what?()A、Two secret keysB、Two nonsecret keysC、Two secret numbersD、Two nonsecret numbers
---“()” ---“Two degrees on starboard.” A、What rudder?B、How is the heading?C、How answer?D、What course?
What are two security appliances that can be installed in a network? (Choose two.)() A、ATMB、IDSC、IOSD、IOXE、IPSF、SDM
What are two outcomes of deploying virtual SANs? ()(Choose two.)A、increased administrationB、improved availabilityC、reduced backupD、increased securityE、greater storage demand
多选题What are two outcomes of deploying virtual SANs? ()(Choose two.)Aincreased administrationBimproved availabilityCreduced backupDincreased securityEgreater storage demand
多选题What are two security appliances that can be installed in a network? ()AATMBIDSCIOSDIOXEIPSFSDM
多选题What are two rulebase types within an IPS policy on an SRX Series device?() (Choose two.)Arulebase-ipsBrulebase-ignoreCrulebase-idpDrulebase-exempt
多选题What are two valid Cluster load balancing methods? ()(Choose two.)AurlhashBbackup chainingCleast connectionsDfewest outstanding requests
多选题What are two characteristics of Telnet (Choose two.)()。AItsendsdataincleartextformat.BItisnolongersupportedonCisconetworkdevices.CItismoresecurethanSSHDItrequiresanenterpriselicenseinordertobeimplemented.EItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.
多选题What are two security appliances that can be installed in a network (Choose two.)()。AATMBIDSCIOSDIOXEIPSFSDM