Which configuration is used to enable root guard?()A、interface gig3/1 spanning-tree guard rootB、interface gig3/1 spanning-tree root guardC、interface gig3/1 spanning-tree root-guardD、interface gig3/1 spanning-tree root-guard default

Which configuration is used to enable root guard?()

  • A、interface gig3/1  spanning-tree guard root
  • B、interface gig3/1  spanning-tree root guard
  • C、interface gig3/1  spanning-tree root-guard
  • D、interface gig3/1  spanning-tree root-guard default

相关考题:

A customer wants to create a custom Junos Pulse configuration. Which two are required?() A. Connection setB. Configuration setC. Custom installerD. Component set

Which command will delete the current rescue configuration?() A. user@router# system delete configuration rescueB. user@router request system configuration rescue deleteC. user@router# delete rescue configurationD. user@router file delete rescue-configuration

You have been asked to configure a login class which will permit its users to view and edit the configuration. The class should only allow the configuration of the interfaces and firewall heirarchies. Which configuration correctly accomplishes this?()A.AB.BC.CD.D

Which of the following should an administrator do after running a command from the console onthe perimeter router?() A. Update the configuration logsB. Update the network wiring schematicsC. Update the network configuration proceduresD. Compare the configuration with the baseline

An engineer is preparing an implementation plan in which the configuration needs to influence BGP‘s choice of best path.Which of the following is least likely to be used by the configuration in this imple mentation plan?()A. WeightB. Origin codeC. AS_PathD. Local_Pref

Which two functions does Cisco Configuration Assistant provide?()A、wireless connectivityB、call routing configurationC、device discoveryD、call forwardingE、command line configuration

The VLANs in switch R1 are being modified. Which of the following are updated in R1 every time a VLAN is modified?()A、Configuration revision numberB、Configuration revision flag fieldC、Configuration revision reset switchD、Configuration revision databaseE、None of the other alternatives apply

Which of the following is an accurate description of the command copy startup-configftp://kevin:cisco@192.168.1.74?()A、The configuration on the FTP server is copied to RAMB、The command is not valid on a Cisco routerC、The configuration file in RAM is copied to an FTP serverD、The configuration file in NVRAM is copied to an FTP serverE、The configuration on the FTP server is copied to NVRAMF、The configuration will be copied from NVRAM to an FTP server with a filename of Kevin

What is the new Oracle Shared Server?()A、An improved version of multithreaded server configuration. B、A connection pooling configuration where several clients are connected to the same server process. C、Two more database servers, which share data by means of database links; the client software is unaware to which server it is connected. D、A configuration of Real Application Cluster where the client connection is routed to the least busy instance.

Which CLI mode allows you to make configuration changes?()A、enable modeB、configuration modeC、operational modeD、active mode

Which three statements are valid SDM configuration wizards? ()A、NATB、VPNC、STPD、Security Audit

An engineer is preparing an implementation plan in which the configuration needs to influence BGP's choice of best path. Which of the following is least likely to be used by the configuration in this imple mentation plan?()A、WeightB、Origin codeC、AS_PathD、Local_Pref

After an unsuccessful synchronization or DARE update, which copy of the HACMP ODM remains  To prevent further changes from being made?()  A、 The ’Default’ configuration directoryB、 The ’Active’ configuration directoryC、 The ’Staging’ configuration directoryD、 The ’Snapshot’ configuration directory

Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()A、AccessAdmin,AccessAssistant,and IMS Configuration UtilityB、AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration UtilityC、AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration UtilityD、AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

By default, which character indicates the configuration mode prompt?()A、#B、C、$D、%

You are designing a Windows 7 deployment image.  You plan to install Windows 7 Enterprise with a Multiple Activation Key (MAK).    You need to add the MAK to the configuration pass by using an answer file.   To which configuration pass should you add the MAK?()A、the Specialize configuration passB、the Generalize configuration passC、the WindowsPE configuration passD、the AuditSystem configuration pass

单选题You are designing a Windows 7 deployment image.  You plan to install Windows 7 Enterprise with a Multiple Activation Key (MAK).    You need to add the MAK to the configuration pass by using an answer file.   To which configuration pass should you add the MAK?()Athe Specialize configuration passBthe Generalize configuration passCthe WindowsPE configuration passDthe AuditSystem configuration pass

单选题Which command will save the current active configuration as the rescue configuration?()A AB BC CD D

多选题Which two functions does Cisco Configuration Assistant provide?()Awireless connectivityBcall routing configurationCdevice discoveryDcall forwardingEcommand line configuration

多选题Which three statements are true regarding the candidate configuration?()AThe candidate configuration is a temporary configuration that might become the active configuration.BA candidate configuration is initially populated with the configuration currently active on the system.CChanges to the candidate configuration take effect immediately.DThe candidate configuration becomes the active configuration after a system reboot.EThe configure private command allows concurrent editing of a candidate configuration by multiple users.

单选题Which of the following is an accurate description of the command copy startup-configftp://kevin:cisco@192.168.1.74?()AThe configuration on the FTP server is copied to RAMBThe command is not valid on a Cisco routerCThe configuration file in RAM is copied to an FTP serverDThe configuration file in NVRAM is copied to an FTP serverEThe configuration on the FTP server is copied to NVRAMFThe configuration will be copied from NVRAM to an FTP server with a filename of Kevin

单选题An administrator needs to update a router configuration for a router that does not support SSH.Which of the following can be used to securely update the router configuration?()AFTPBSNMPv2CTFTPDKTTPS

多选题Which two statements are true when using the configure exclusive CLI command?()AMultiple users can enter configuration mode and have their own private configuration.BWhen a user commits, only the user's changes are committed.CA message indicates which other users are in configuration mode and what portion of the configuration they are editing.DOnly a single user can edit the configuration.

单选题Which of the following should an administrator do after running a command from the console onthe perimeter router?()AUpdate the configuration logsBUpdate the network wiring schematicsCUpdate the network configuration proceduresDCompare the configuration with the baseline

单选题Which command will delete the current rescue configuration?()Auser@router# system delete configuration rescueBuser@router request system configuration rescue deleteCuser@router# delete rescue configurationDuser@router file delete rescue-configuration

多选题On router R1, which three of the following protocols will be forwarded to a host specified by the "iphelper-address" interface configuration command if the configuration has not been modified by the"ip forward-protocol udp" global configuration command?()ABOOTPBTFTPCARPDDNSEproxy-ARPFFTPGCDP

单选题After an unsuccessful synchronization or DARE update, which copy of the HACMP ODM remains  To prevent further changes from being made?()A The ’Default’ configuration directoryB The ’Active’ configuration directoryC The ’Staging’ configuration directoryD The ’Snapshot’ configuration directory

单选题Which interface is used to configure debug parameters for log files?()ADatastore Control Center  BAlarm and Trace Configuration  CCustom File Configuration  DControl Center