Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the path cost calculated?()A、number of hopsB、priority of the bridgeC、interface bandwidthD、interface delayE、None of the above

Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the path cost calculated?()

  • A、number of hops
  • B、priority of the bridge
  • C、interface bandwidth
  • D、interface delay
  • E、None of the above

相关考题:

● Every host and router on the Internet has an IP address,which encodes its (69) .(69) A.host numberB.host number and socketC.network numberD.host number and network number

Every host and router on the Internet has an IP address, which encodes itsA.host numberB.host number and socketC.network numberD.host number and network number

Network(67)has full fights and permissions to all resources on a network.A.userB.guestC.administratorD.owner

Which statement describes the primary difference between the WX and WXC platforms?() A. The WX platform has built-in hard drives.B. The WXC platform has no built-in hard drives.C. The WX platform uses Network Sequence Caching technology.D. The WXC platform uses the Network Sequence Caching technology

When each routing device has a consistent view of the network topology, the network is said to be:() A. fault tolerantB. convergedC. autonomousD. vectored

A network technician is installing a new managed 10/100 Mbps switch on the network. The network has an older printer with a 10Mbps network adapter that will be moved to the new switch.Which of the following settings on the switch will need to be configured to support the printer?()A. MAC filteringB. IP addressC. PoED. Port speed

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()A.AB.BC.CD.D

Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network.What should you do?()A.AB.BC.CD.D

A company is experiencing network delays. The network administrator discovers that a worker in a location far from the MDF has connected an old 10BASE-T switch with redundant links to the existing network.How could this action be responsible for the impaired network performance?()A. Connecting a host to the old switch has created a broadcast storm.B. The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.C. The old switch does not support VLANs, which has disabled the VLAN configuration of the entire the network.D. The old switch does not support full-duplex operation, effectively forcing half-duplex operation throughout the network.E. Spanning Tree Protocol has elected the old switch as the root bridge, creating inefficient data paths through the switched network.

A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?() A.ARPB.CDPC.DHCPD.DNSE.ICMP

Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network.The network administrator connected to console port,issued the show ip route command,and was able to ping the server.Based on the output of the show ip route command topology shown in the graphic,what is the cause of the failure?()A.IP routing is not enabledB.A static route is configured incorrectlyC.The network has not fully convergedD.The FastEthernet interface on Coffee is disabledE.The routing table on Coffee has not updatedF.The neighbor relationship table is not correctly updated

Which two of these are characteristics of an IDS sensor?()A、passively listens to network trafficB、is an active device in the traffic pathC、has a permissive interface that is used to monitor networksD、traffic arrives on one IDS interface and exits on anotherE、has a promiscuous interface that is used to monitor the network

A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()A、 networkB、 applicationC、 sessionD、 data link

Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network.  You need to ensure that the computer is able to connect to the wireless network.  What should you do?()A、Change the Network Category setting of the wireless connection to Public.B、Enable the Internet Connection Sharing feature on the wireless network adapter.C、Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.D、Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.

The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A、One router is running RIPv1.B、RIP neighbor is 224.0.0.9.C、The network contains a loop.D、Network 10.10.1.0 is reachable.

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network

The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()A、Lower the bridge priority number.B、Change the MAC address of the switch.C、Increase the VTP revision number for the domain.D、Lower the root path cost on the switch ports.E、Assign the switch an IP address with the lowest value.

Router R1 exists in an Enterprise that uses EIGRP as its routing protocol. The show ip route command output on router R1 lists the following phrase: "Gateway of last resort is 1.1.1.1 to network 2.0.0.0". Whic h of the following is most likely to have caused this output to occur on R1?()A、R1 has been configured with an ip default- network 2.0.0.0 command.B、R1 has been configured with an ip route 0.0.0.0 0.0.0.0 1.1.1.1 command.C、R1 has been configured with an ip route 2.0.0.0 255.0.0.0 1.1.1.1 command.D、Another router has been configured with an ip default - network 2.0.0.0 command.E、Another router has been configured with an ip route 2.0.0.0 255.0.0.0 1.1.1.1 command.

Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()A、AshortB、Open pairsC、ESDD、EMI

When each routing device has a consistent view of the network topology, the network is said to be:()A、fault tolerantB、convergedC、autonomousD、vectored

A new system has been installed and the network connection is very slow. The network administrators are sure that the network port is set to 100 full duplex. What command will display the configured and current speed settings of the adapter?()A、lsdevB、lsattrC、entstatD、ifconfig

A network administrator has a 10base2 network.  A card is provided that has both 10base2 and 10base5 ports.  Which of the following types of cables should be selected in SMIT during configuration of the adapter?()A、TPB、BNCC、DIXD、CAT5

Which statement describes the primary difference between the WX and WXC platforms?()A、The WX platform has built-in hard drives.B、The WXC platform has no built-in hard drives.C、The WX platform uses Network Sequence Caching technology.D、The WXC platform uses the Network Sequence Caching technology

Your network contains a domain controller that has two network connections named Internal and  Private. Internal has an IP address of 192.168.0.20. Private has an IP address of 10.10.10.5.  You need to prevent the domain controller from registering Host (A) records for the 10.10.10.5 IP address.   What should you do()A、Modify the netlogon.dns file on the domain controller.B、Modify the Name Server settings of the DNS zone for the domain.C、Modify the properties of the Private network connection on the domain controller.D、Disable netmask ordering on the DNS server that hosts the DNS zone for the domain.

单选题Which statement describes the primary difference between the WX and WXC platforms?()AThe WX platform has built-in hard drives.BThe WXC platform has no built-in hard drives.CThe WX platform uses Network Sequence Caching technology.DThe WXC platform uses the Network Sequence Caching technology

单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()AOne router is running RIPv1.BRIP neighbor is 224.0.0.9.CThe network contains a loop.DNetwork 10.10.1.0 is reachable.

单选题A network technician is installing a new managed 10/100 Mbps switch on the network. The network has an older printer with a 10Mbps network adapter that will be moved to the new switch. Which of the following settings on the switch will need to be configured to support the printer?()AMAC filteringBIP addressCPoEDPort speed

多选题A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? ()AARPBCDPCDHCPDDNSEICMP