niusouti.com

Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in aswitched network environment?() (Choose two.)A. Features such as UplinkFast and BackboneFast are compatible with RSTP.B. An RSTP that is based on Cisco products ge

题目
Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in aswitched network environment?() (Choose two.)

A. Features such as UplinkFast and BackboneFast are compatible with RSTP.

B. An RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.

C. Cisco proprietary enhancements are not transparent.

D. Information about port roles is sent to all switches.

E. RSTPs that are based on Cisco products require no additional configuration.


相似考题
参考答案和解析
参考答案:B, E
更多“Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in aswitched network environment?() (Choose two.) ”相关问题
  • 第1题:

    Which of the following are associated with the application layer of the OSI model (Choose two.)()。

    A.ping

    B.Telnet

    C.FTP

    D.TCP

    E.IP


    参考答案:B, C

  • 第2题:

    HSRP. Known as Hot Stanclby Router Protocol, is a Cisco proprietarv redundancy protocol . As an experienced network administrator, you are required to configure HSRP on a XYZ network. Which TWO of the following wii be available and shared between the routers configured with HSRP? ()(Choose two.)

    • A、a shared single interface
    • B、the ability to track serial interfaces
    • C、UDP-based hello packets
    • D、the impact of flapping links if timers are too low

    正确答案:B,D

  • 第3题:

    Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network?()

    • A、802.1d
    • B、VTP
    • C、802.1q
    • D、STP
    • E、SAP

    正确答案:A,D

  • 第4题:

    You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions. And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)

    • A、no single point of failure
    • B、determine which protocol to use
    • C、trading database server location
    • D、deterministic response to all failures

    正确答案:A,D

  • 第5题:

    At which layers of the OSI model do WANs operate (Choose two.)()。

    • A、application layer
    • B、session layer
    • C、transport layer
    • D、network layer
    • E、datalink layer
    • F、physical layer

    正确答案:E,F

  • 第6题:

    Which two statements are true about precedence values in policy?() (Choose two.)

    • A、1 is the default precedence.
    • B、A lower number is preferred.
    • C、A higher number is preferred.
    • D、100 is the default precedence.

    正确答案:B,D

  • 第7题:

    多选题
    Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in a switchednetwork environment?() (Choose two.)
    A

    Features such as UplinkFast and BackboneFast are compatible with RSTP.

    B

    An RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.

    C

    Cisco proprietary enhancements are not transparent.

    D

    Information about port roles is sent to all switches.

    E

    RSTPs that are based on Cisco products require no additional configuration.


    正确答案: B,E
    解析: 暂无解析

  • 第8题:

    多选题
    Which two are components of the enhanced services software architecture?() (Choose two.)
    A

    Linux kernel

    B

    routing protocol daemon

    C

    session-based forwarding module

    D

    separate routing and security planes


    正确答案: B,A
    解析: 暂无解析

  • 第9题:

    多选题
    Your customer wants to build a network for a financial trading floor that has a requirement formultiple high-value transactions, which are also vital to the customer. What are the two mostcritical requirements?() (Choose two.)
    A

    no single point of failure

    B

    trading database server location

    C

    redundant application servers location

    D

    deterministic response to all failures

    E

    determine which protocol to use


    正确答案: A,D
    解析: 暂无解析

  • 第10题:

    多选题
    What functions do routers perform in a network? (Choose two.)()
    A

    packet switching

    B

    access layer security

    C

    path selection

    D

    VLAN membership assignment

    E

    bridging between LAN segments

    F

    microsegmentation of broadcast domains


    正确答案: F,C
    解析: 暂无解析

  • 第11题:

    多选题
    At which layers of the OSI model do WANs operate (Choose two.)()。
    A

    application layer

    B

    session layer

    C

    transport layer

    D

    network layer

    E

    datalink layer

    F

    physical layer


    正确答案: E,D
    解析: 暂无解析

  • 第12题:

    多选题
    Which of the following are associated with the application layer of the OSI model (Choose two.)()。
    A

    ping

    B

    Telnet

    C

    FTP

    D

    TCP

    E

    IP


    正确答案: C,D
    解析: 暂无解析

  • 第13题:

    In a RSTP implementation, which of the following two link types are used? ()(Choose two.)

    • A、Shared
    • B、Point-to-Point
    • C、Designated
    • D、Multiaccess non-broadcast

    正确答案:A,B

  • 第14题:

    Which of the following are associated with the application layer of the OSI model (Choose two.)()。

    • A、ping
    • B、Telnet
    • C、FTP
    • D、TCP
    • E、IP

    正确答案:B,C

  • 第15题:

    At which layer of the OSI model is RSTP used to prevent loops?()

    • A、data link
    • B、network
    • C、physical
    • D、transport

    正确答案:A

  • 第16题:

    Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()

    • A、 access point certification and software control
    • B、 compression and Layer 3 address mapping
    • C、 Layer 3 addressing and distribution
    • D、 packet encapsulation, fragmentation, and formatting
    • E、 SNMP monitoring services

    正确答案:A,D

  • 第17题:

    Which two packet attributes contribute to the identification of a session? ()(Choose two.)

    • A、destination port
    • B、TTL
    • C、IP options
    • D、protocol number

    正确答案:A,D

  • 第18题:

    多选题
    Which two statements are true about precedence values in policy?() (Choose two.)
    A

    1 is the default precedence.

    B

    A lower number is preferred.

    C

    A higher number is preferred.

    D

    100 is the default precedence.


    正确答案: C,B
    解析: 暂无解析

  • 第19题:

    多选题
    Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()
    A

    access point certification and software control

    B

    compression and Layer 3 address mapping

    C

    Layer 3 addressing and distribution

    D

    packet encapsulation, fragmentation, and formatting

    E

    SNMP monitoring services


    正确答案: C,E
    解析: 暂无解析

  • 第20题:

    多选题
    HSRP. Known as Hot Stanclby Router Protocol, is a Cisco proprietarv redundancy protocol . As an experienced network administrator, you are required to configure HSRP on a XYZ network. Which TWO of the following wii be available and shared between the routers configured with HSRP? ()(Choose two.)
    A

    a shared single interface

    B

    the ability to track serial interfaces

    C

    UDP-based hello packets

    D

    the impact of flapping links if timers are too low


    正确答案: C,A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)()。
    A

    amount of RAM

    B

    bridge priority

    C

    IOS version

    D

    IP address

    E

    MAC address

    F

    speed of the links


    正确答案: B,A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in aswitched network environment?() (Choose two.)
    A

    Features such as UplinkFast and BackboneFast are compatible with RSTP.

    B

    An RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.

    C

    Cisco proprietary enhancements are not transparent.

    D

    Information about port roles is sent to all switches.

    E

    RSTPs that are based on Cisco products require no additional configuration.


    正确答案: D,C
    解析: 暂无解析

  • 第23题:

    多选题
    Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network?()
    A

    802.1d

    B

    VTP

    C

    802.1q

    D

    STP

    E

    SAP


    正确答案: D,C
    解析: 暂无解析