搜题
用户您好, 请在下方输入框内搜索其它题目:
搜题
题目内容 (请给出正确答案)
提问人:网友 发布时间:
【多选题】

Refer to the exhibit. The Layer 2 network uses VTP to manage its VLAN database. A network designer created all VLANs on the VTP server (switch 1) and it has been advertised through VTP to all other VTP clients (switches 2 through 4). Due to network growth, a network operator decided to add a new switch between switch 1 and switch 3. The network operator has been instructed to use a refurbished switch and use a VTP client. Which three of these factors should the network operator consider to minimize the impact of adding a&en

A、 Pay special attention to the VTP revision number, because the higher value takes the priority.

B、 Configure all VLANs manually on the new switch in order to avoid connectivity issues.

C、 A trunk should be established between the new switch and switches 1 and 3 as VTP only runs over trunk links.

D、 Set at least the VTP domain name and password to get the new switch synchronized.

E、 An ISL trunk should be established between the new switch and switches 1 and 3, because VTP only runs over ISL.

F、 Pay special attention to the VTP revision number, because the lower value takes the priority.

更多“ Refer to the exhibit. The Layer 2 network uses VTP to manage its VLAN database. A network designer created all VLANs on the VTP server (switch 1) and it has been advertised through VTP to all other VTP clients (switches 2 through 4). Due to network growth, a network operator decided to add a new switch between switch 1 and switch 3. The network operator has been instructed to use a refurbished switch and use a VTP client. Which three of these factors should the network operator consider to minimize the impact of adding a&en”相关的问题
第1题

A、A.The router will forward packets from R3 to R2 to R1  B、B.The router will forward packets from R3 to R1  C、C.The router will forward packets from R3 to R1 to R2  D、D.The router will forward packets from R3 to R2 to R1 AND from R3 to R1  

点击查看答案
第5题

A、A. The traffic will be forwarded to the router processor for further processing.  B、B. The traffic will be dropped.  C、C. The traffic will be forwarded to the TCAM for further processing.  D、D. The traffic will be forwarded without further processing.  

点击查看答案
第6题

A、A. snooping attack  B、B. rogue device attack  C、C. STP attack  D、D. VLAN attack  E、E. spoofing attack  F、F. MAC flooding attack  

点击查看答案
第7题

A、to the zone-pair  B、to the zone  C、to the interface  D、to the global service policy  

点击查看答案
第8题

A、to display rewritten IP unicast packets  B、to display ARP resolution packets  C、to display ARP throttling  D、to display TCAM matches  E、to display CEF-based MLS lookups  F、to display entries in the Forwarding Information Base (FIB)  

点击查看答案
第10题

A、WRED  B、traffic shaping  C、packet marking  D、packet classification  E、FIFO queuing within the class  

点击查看答案
客服
TOP

请使用微信扫码支付

订单号:
遇到问题请联系在线客服