單項(xiàng)選擇題At which layer of the OSI model does the Spanning Tree Protocol (STP) operate at?()

A.Layer 5
B.Layer 4
C.Layer 3
D.Layer 2
E.Layer 1


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Which command would display OSPF parameters such as filters,default metric,maximum paths,and number of areas configured on a outer()

A.show ip protocol
B.show ip route
C.show ip ospfinterface
D.show ip ospf
E.show ip nterface
F.None of the other alternatives apply

2.多項(xiàng)選擇題An OSPF link can be in multiple states at any givenmoment(ie.Exstart,exchange,full). Which two IOS commands let you view the state of the link()

A.show ip ospf
B.show ip protocols
C.show ip ospfneighbor
D.show ip ospfinterface

4.單項(xiàng)選擇題Which command should you use to verify what networks are being routed by a given OSPF process()

A.show ip ospf
B.show ip route
C.show ip protocol
D.show ip ospfdatabase
E.None of the other alternatives apply

5.多項(xiàng)選擇題While troubleshooting some connectivity issues,you issue the “show ip ospf database”in order to ex amine the link state database. Which three of the statements below are true regarding the OSPF link state database()

A.Each router has an identical link state database.
B.External routes are imported into a separate link state database.
C.Syn chronization of link state databases is maintained via floodingo f LSAs.
D.Information in the link state database is used to build a routing table by calculating a shortest-path tree.
E.By default,link state databases are refreshede very 10 minutes in the absence of topology changes.

最新試題

cisco ios command to interface dialer 0

題型:問答題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()

題型:多項(xiàng)選擇題

Which statement correctly describes IPsec VPN backup technology?()

題型:單項(xiàng)選擇題

This item contains several questions that you must answer. You can view these questions byclicking on the Questions button to the left. Changing questions can be accomplished by clicking the numbers to the left of each question. In order to complete the questions, you will need to referto the SDM and the topology, neither of which is currently visible.To gain access to either the topology or the SDK click on the button to left side of the screen thatcorresponds to the section you wish to access. When you have finished viewing the topology theSDK you can return to your questions by clicking on the Questions button to the left.Which defined peer IP address an local subnet belong to Crete?()

題型:多項(xiàng)選擇題

Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)

題型:問答題

In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()

題型:單項(xiàng)選擇題

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

題型:單項(xiàng)選擇題

Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)

題型:問答題

This item contains several questions that you must answer. You can view these questions byclicking on the Questions button to the left. Changing questions can be accomplished by clickingthe numbers to the left of each question. In order to complete the questions, you will need to referto the SDM and the topology, neither of which is currently visible. To gain access to either thetopology or the SDK click on the button to left side of the screen that corresponds to the sectionyou wish to access. When you have finished viewing the topology the SDK you can return to yourquestions by clicking on the Questions button to the left.Which IPSec rule is used for the Olympia branch and what does it define?()

題型:多項(xiàng)選擇題