多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard

多选题
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()
A

loop guard

B

storm control

C

storm suppression

D

broadcast suppression

E

BPDU guard


参考解析

解析: 暂无解析

相关考题:

Which of the listed conditions can be considered as the single greatest cause of accidents?A.SpeedB.Excessive knowledge or skillC.Human errorD.Excitement

A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?() A. It enables an attacker to perform an IP sweep of devices.B. It enables a hacker to know which operating system the system is running.C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D. It creates a ping of death and can cause the entire network to be infected with a virus.

When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? () A. rate limit voice trafficB. configure spanning-tree for fast link convergenceC. isolate voice traffic on separate VLANsD. classify and mark traffic close to the source

Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network?() A.802.1dB.VTPC.802.1qD.STPE.SAP

Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()A、 Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannotB、 UDLD protects against STP failures caused by cabling problems that create one-way links.C、 Loop guard detects and protects against duplicate packets being received and transmitted on different portsD、 UDLD protects against unidirectional cabling problems on copper and fiber media.E、 Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard

When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? ()A、rate limit voice trafficB、configure spanning-tree for fast link convergenceC、isolate voice traffic on separate VLANsD、classify and mark traffic close to the source

You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()A、The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tagB、No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreC、Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsD、IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offE、MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerF、The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped

Which two options can be used as traffic descriptors when classifying and marking traffic? ()A、incoming interfaceB、Layer 2 differentiated services code point (DSCP)C、Layer 3 IP precedenceD、outgoing interface

Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network?()A、802.1dB、VTPC、802.1qD、STPE、SAP

When designing a converged network, which measures can be taken at the building access layerto help eliminate latency and ensure end-to-end quality of service can be maintained?()A、 rate limit voice trafficB、 configure spanning-tree for fast link convergenceC、 isolate voice traffic on separate VLANsD、 classify and mark traffic close to the source

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard

Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()A、Inadequate RAMB、Slow processorC、PCI busD、Excessive network traffic

An x445 can sustain up to two memory chip failures per memory bank, and in an 8-way with four memory banks, up to eight memory chip failures can be sustained.  Which combination of EXA features provides this functionality?()A、ECC with ChipkillB、ECC with Memory MirroringC、Chipkill with Memory ProteXionD、Memory ProteXion with Hot Spare Memory

Which two statements are true regarding IDP?()A、IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.C、IDP inspects traffic up to the Presentation layer.D、IDP inspects traffic up to the Application layer.

多选题Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()ALoop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannotBUDLD protects against STP failures caused by cabling problems that create one-way links.CLoop guard detects and protects against duplicate packets being received and transmitted on different portsDUDLD protects against unidirectional cabling problems on copper and fiber media.ELoop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

单选题Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()A Inadequate RAMB Slow processorC PCI busD Excessive network traffic

多选题You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()AThe access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is trusted that it isentering the network with the appropriate tagBNo traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreCTraffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsDIP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offEMAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerFThe distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped

多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard

多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard

多选题When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? ()Arate limit voice trafficBconfigure spanning-tree for fast link convergenceCisolate voice traffic on separate VLANsDclassify and mark traffic close to the source

单选题Which of the following conditions can cause excessive lube oil consumption in a diesel engine?()ALow lube oil temperatureBDirty lube oil strainerCLow lube oil pressureDHigh lube oil temperature

多选题Which two statements are true regarding IDP?()AIDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.CIDP inspects traffic up to the Presentation layer.DIDP inspects traffic up to the Application layer.

单选题Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()AInadequate RAMBSlow processorCPCI busDExcessive network traffic

多选题Which two mechanisms can be used to detect IPsec GRE tunnel failures?()ADead Peer Detection (DPD)BCDPCisakmp keepalivesDGRE keepalive mechanismEThe hello mechanism of the routing protocol across the IPsec tunnel

多选题Which three statements about BGP confederation and route reflectors are true? ()AClusters are used in confederation schemes to avoid loops.BBGP network can have a confederation within a route reflector area.CAn internal BGP network cannot have a route reflector within a confederation.DAn internal BGP network can have a route reflector within a confederation.EClusters are used in route reflector schemes to avoid loops.FBGP network cannot have a confederation within a route reflector area.

多选题Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network?()A802.1dBVTPC802.1qDSTPESAP

多选题When designing a converged network, which measures can be taken at the building access layerto help eliminate latency and ensure end-to-end quality of service can be maintained?()Arate limit voice trafficBconfigure spanning-tree for fast link convergenceCisolate voice traffic on separate VLANsDclassify and mark traffic close to the source