When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?()A、when all switches have the same BID as the root switchB、when all switches have received the MAC address of each neighboring switchC、when every enabled switch port has been assigned a unique identifierD、when every operating switch port is in either the blocking or forwarding stateE、when all switches are in either client, server, or transparent mode
When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?()
- A、when all switches have the same BID as the root switch
- B、when all switches have received the MAC address of each neighboring switch
- C、when every enabled switch port has been assigned a unique identifier
- D、when every operating switch port is in either the blocking or forwarding state
- E、when all switches are in either client, server, or transparent mode
相关考题:
When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?A.when all switches have the same BID as the root switchB.when all switches have received the MAC address of each neighboring switchC.when every enabled switch port has been assigned a unique identifierD.when every operating switch port is in either the blocking or forwarding stateE.when all switches are in either client, server, or transparent mode
What is a Label-Switched Path?() A. a traffic engineered pathB. another name for a Frame Relay PVCC. a bidirectional path through a networkD. a unidirectional path through a network
When installing a new PCIe network card, when should manufacturer software and drivers beinstalled?() A. Before inserting the PCIe network card in the caseB. After inserting the new PCIe network card in the caseC. They will be automatically loaded after installationD. Load them concurrently with the PCIe network card
Packet-switching wireless networks are preferable(66)when transmissions are(67)bemuse of the way charges are(68)per packet. Circuit-switched networks are preferable for transferring large files or for other lengthy transmissions because customers are(69)for the(70)of time they use the network.A.toB.forC.thanD.only
A programmed computer begins to show on its screen the figures you needA.to be switched onB.when switched onC.switching onD.being switche don
Which one of the following protocols allows the information about the configuration of a new VLAN to be distributed across entire switched network?()A、STPB、VTPC、EIGRPD、SNMPE、CDPF、None of the above
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()A、STPB、VTPC、GVRPD、SNMPE、DHCP
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP
What is the purpose of the spanning-tree algorithm in a switched LAN?()A、To provide a monitoring mechanism for networks in switched environments.B、To manage VLANs across multiple switches.C、To prevent switching loops in networks with redundant switched paths.D、To segment a network into multiple collision domains.E、To prevent routing loops in networks.
Which of the following technologies allows multiple logical subnets to span an entire physical switched network?()A、 ARPB、 DMZC、 VLAND、 VPN
In a switched LAN network, what is the Spanning-Tree algorithm used for?()A、It is used to provide a mechanism for routing updates in switched environments.B、It is used to prevent routing loops in networks with redundant routes.C、It is used to prevent switching loops in networks with redundant switched routes.D、It is used to manage, the addition, deletion, and naming of VLANs across multiple switches.E、It is used to segment a network into multiple collision domains.F、None of the above.G、All of the above are functions of STP.
pany uses MSTP within their switched LAN. What is the main purpose of Multiple Instance Spanning Tree Protocol (MSTP)?()A、 To enhance Spanning Tree troubleshooting on multilayer switchesB、 To reduce the total number of spanning tree instances necessary for a particular topology C、 To provide faster convergence when topology changes occur in a switched networkD、 To provide protection for STP when a link is unidirectional and BPDUs are being sent but not receivedE、 None of the other alternatives apply
In an Ethernet network, under what two scenarios can devices transmit?()A、when they receive a special tokenB、when there is a carrierC、when they detect no other devices are sendingD、when the medium is idleE、when the server grants access
When installing a new PCIe network card, when should manufacturer software and drivers beinstalled?()A、Before inserting the PCIe network card in the caseB、After inserting the new PCIe network card in the caseC、They will be automatically loaded after installationD、Load them concurrently with the PCIe network card
In order to increase reliability, minimize collisions and establish a large number of systems on an Ethernet segment, which of the following options should be selected for the Ethernet network?()A、10BaseTB、Switched 10BaseTC、Switched 100BaseT Half-DuplexD、Switched 100BaseT Full-Duplex
What is a Label-Switched Path?()A、a traffic engineered pathB、another name for a Frame Relay PVCC、a bidirectional path through a networkD、a unidirectional path through a network
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling. You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home. What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home. Which two actions should you perform?()A、When you configure access to the wired network at home, set the wired network adapter location type to Public.B、When you configure access to the wired network at home, set the wired network adapter location type to Private.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.
单选题When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?()Awhen all switches have the same BID as the root switchBwhen all switches have received the MAC address of each neighboring switchCwhen every enabled switch port has been assigned a unique identifierDwhen every operating switch port is in either the blocking or forwarding stateEwhen all switches are in either client, server, or transparent mode
单选题How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()ATraffic is switched from the first node receiving the AIS indication.BTraffic is switched from the far side of the failure, allowing handshaking to occur.CUPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.DUPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.
单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP
单选题When may the automatic identification system (AIS) be switched off? ()AAt anytime as long as it is properly loggedBAt the Master's professional judgmentCOnly when the vessel is at anchor or in portDUnder no circumstance
单选题pany uses MSTP within their switched LAN. What is the main purpose of Multiple Instance Spanning Tree Protocol (MSTP)?()A To enhance Spanning Tree troubleshooting on multilayer switchesB To reduce the total number of spanning tree instances necessary for a particular topology C To provide faster convergence when topology changes occur in a switched networkD To provide protection for STP when a link is unidirectional and BPDUs are being sent but not receivedE None of the other alternatives apply
单选题When installing a new PCIe network card, when should manufacturer software and drivers beinstalled?()ABefore inserting the PCIe network card in the caseBAfter inserting the new PCIe network card in the caseCThey will be automatically loaded after installationDLoad them concurrently with the PCIe network card
单选题Which of the following technologies allows multiple logical subnets to span an entire physical switched network?()A ARPB DMZC VLAND VPN
单选题What is a Label-Switched Path?()Aa traffic engineered pathBanother name for a Frame Relay PVCCa bidirectional path through a networkDa unidirectional path through a network
单选题What is the purpose of the spanning-tree algorithm in a switched LAN?()ATo provide a monitoring mechanism for networks in switched environments.BTo manage VLANs across multiple switches.CTo prevent switching loops in networks with redundant switched paths.DTo segment a network into multiple collision domains.ETo prevent routing loops in networks.