Why would an administrator change the value of the spanning-tree priority of a switch?() A. in order to optimize the path that frames take from source to destinationB. to increase the priority so a designated port will become a root portC. to increase the BID, so the switch is more likely to become root bridgeD. in order to allow VLANs to be sent from one switch to another across a single linkE. to force a given switch to become an STP server

Why would an administrator change the value of the spanning-tree priority of a switch?()

A. in order to optimize the path that frames take from source to destination

B. to increase the priority so a designated port will become a root port

C. to increase the BID, so the switch is more likely to become root bridge

D. in order to allow VLANs to be sent from one switch to another across a single link

E. to force a given switch to become an STP server


相关考题:

要将交换机100M端口的路径成本设置为25,以下哪个命令是正确的?() A.Switch(config)#spanning-tree cost 25B.Switch(config-if)#spanning-tree cost 25C.Switch(config)#spanning-tree priority 25D.Switch(config-if)#spanning-tree path-cost 25

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?A. path costB. lowest port MAC addressC. VTP revision numberD. highest port priority numberE. port priority number and MAC addressF. None of the above

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

Why would the Ezonexam administrator change the value of the spanning-tree priority of a switch?A. in order to optimize the path that frames take from source to destinationB. to increase the priority so a designated port will become a root portC. to increase the BID, so the switch is more likely to become root bridgeD. in order to allow VLANs to be sent from one switch to another across a single linkE. to force a given switch to become an STP serverF. None of the above

The OSPF process has been started and the networks have been configured for Area 0 as shown in the diagram. The network administrator has several options for configuring RouterB to ensure that it will be preferred as the designated router (DR) for the 172.16.1.0 /24 LAN segment. What configuration tasks could be used to establish this preference (Choose three.)()。A.Configure the priority value of the Fa0/0 interface of RouterB to a higher value than any other interface on the Ethernet network.B.Change the router id of Router B by assigning the IP address 172.16.1.130/24 to the Fa0/0 interface of RouterB.C.Configure a loopback interface on RouterB with an IP address higher than any IP address on the other routers.D.Change the priority value of the Fa0/0 interface of RouterB to zero.E.Change the priority values of the Fa0/0 interfaces of RouterA and RouterC to zero.F.No further configuration is necessary.

Why would a network administrator configure port security on a switch()。 A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、pathcost

Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.

A port in a redundant topology is currently in the blocking state and is not receiving BPDUs. To ensure that this port does not erroneously transition to the forwarding state,  which command should be configured to satisfy the requirement?()A、Switch(config)#spanning-tree loopguard defaultB、Switch(config-if)#spanning-tree bdpufilterC、Switch(config)#udld aggressiveD、Switch(config-if)#spanning-tree bpduguard

Which two statements are true when the extended system ID feature is enabled? ()A、The BID is made up of the bridge priority value(two bytes) and bridge MAC address (six bytes).B、The BID is made up of the bridge priority (four bits), the system ID (12 bits), and a bridge MAC address (48 bits).C、The BID is made up of the system ID (six bytes) and bridge priority value (two bytes).D、The system ID value is the VLAN ID (VID).E、The system ID value is a unique MAC address allocated from a pool of MAC addresses assigned to the switch or module.F、The system ID value is a hex number used to measure the preference of a bridge in the spanning-tree algorithm.

Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

What are two things that an access point (AP) does when it receives an 802.11 frame from a Wi-Fi Multimedia (WMM) client? ()A、EAP-FASTEAP-FAS Access Point Protocol (LWAPP) packet is used to generate an 802.1 p priority value in the packets, which are sent to an Ethernet switch by the controllers.B、The AP will police the 802.1 le priority value to ensure it does not exceed the maximum value allowed for the QoS policy that is assigned to that client.C、Once the LWAPP packet is received, the AP generates the IEEE 802.1 p priority value.D、The AP will map the 802.11e priority value to the DSCP value.E、The AP will map the DSCP value to the outer LWAPP frame.

The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()A、BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. B、BPDU guard can guarantee proper selection of the root bridge.C、BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.D、BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.E、None of the other alternatives apply

What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A、path costB、lowest port MAC addressC、VTP revision numberD、highest port priority numberE、port priority number and MAC address

Why would an administrator change the value of the spanning-tree priority of a switch?()A、in order to optimize the path that frames take from source to destinationB、to increase the priority so a designated port will become a root portC、to increase the BID, so the switch is more likely to become root bridgeD、in order to allow VLANs to be sent from one switch to another across a single linkE、to force a given switch to become an STP server

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、path cost

The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()A、Lower the bridge priority number.B、Change the MAC address of the switch.C、Increase the VTP revision number for the domain.D、Lower the root path cost on the switch ports.E、Assign the switch an IP address with the lowest value.

单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()ALower the bridge priority number.BChange the MAC address of the switch.CIncrease the VTP revision number for the domain.DLower the root path cost on the switch ports.EAssign the switch an IP address with the lowest value.

单选题Why would an administrator change the value of the spanning-tree priority of a switch?()Ain order to optimize the path that frames take from source to destinationBto increase the priority so a designated port will become a root portCto increase the BID, so the switch is more likely to become root bridgeDin order to allow VLANs to be sent from one switch to another across a single linkEto force a given switch to become an STP server

单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()Alowest port MAC addressBport priority number and MAC address.CVTP revision numberDhighest port priority number.Epath cost

单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()A Lower the bridge priority number.B Change the MAC address of the switch.C Increase the VTP revision number for the domain.D Lower the root path cost on the switch ports.E Assign the switch an IP address with the lowest value.

单选题What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()Apath costBlowest port MAC addressCVTP revision numberDhighest port priority numberEport priority number and MAC address

单选题Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()A switchport priority extend trustB switchport priority extend cos 2C switchport priority extend cos 11D mls qos cos 2E mls qos cos 2 override

单选题Why would a network administrator configure port security on a switch()。Ato prevent unauthorized Telnet access to a switch portBto limit the number of Layer 2 broadcasts on a particular switch portCto prevent unauthorized hosts from accessing the LANDto protect the IP and MAC address of the switch and associated portsEto block unauthorized access to the switch management interfaces over common TCP ports

单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()Alowest port MAC addressBport priority number and MAC address.CVTP revision numberDhighest port priority number.Epathcost

单选题Why would a network administrator configure port security on a switch?()ATo prevent unauthorized Telnet access to a switch port.BTo limit the number of Layer 2 broadcasts on a particular switch port.CTo prevent unauthorized hosts from accessing the LAN.DTo protect the IP and MAC address of the switch and associated ports.ETo block unauthorized access to the switch management interfaces over common TCP ports.

单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()Alowest port MAC addressBport priority number and MAC addressCVTP revision numberDhighest port priority numberEpath cost

单选题The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()ABPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. BBPDU guard can guarantee proper selection of the root bridge.CBPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.DBPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.ENone of the other alternatives apply