單項選擇題

Three Cisco Catalyst switches have been configured with a first-hop redundancy protocol. While reviewing some show commands, debug output, and the syslog, you discover the following information:

What conclusion can you infer from this information?()

A.VRRP is initializing and operating correctly.
B.HSRP is not properly exchanging three hello messages.
C.VRRP is not properly exchanging three hello messages.
D.HSRP is initializing and operating correctly.
E.GLBP is not properly exchanging three hello messages. 
F.GLBP is initializing and operating correctly.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題



You work as a network engineer for . You study the exhibit carefully. Three switches are configured for HSRP. Switch1 remains in the HSRP listen state. 
What is the most likely cause of this status?()

A.this is normal operation
B.IP addressing is incorrect
C.standby group number does not match VLAN number
D.incorrect standby timers
E.incorrect priority commands

3.單項選擇題

You work as a network engineer for . You study the exhibit carefully. From the configuration shown, 
what can be determined?()
Exhibit:

A.The remaining secure MAC addresses will be dynamically learned, converted to sticky secure MAC addresses, and added to the running configuration.
B.Since a voice VLAN is configured in this example, port security should be set for a maximum of 2.
C.The sticky addresses will only be those manually configured MAC addresses enabled with the sticky keyword.
D.A security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.

4.單項選擇題

When you enable port security on an interface that is also configured with a voice VLAN, 
what is the maximum number of secure MAC addresses that should be set on the port?()

A.No more than one secure MAC address should be set.
B.The default will be set.
C.The IP phone should use a dedicated port, therefore only one MAC address is needed per port.
D.No value is needed if the switchport priority extend command is configured. 
E.No more than two secure MAC addresses should be set.

5.單項選擇題When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()

A.protect (drop packets with unknown source addresses)
B.restrict (increment SecurityViolation counter)
C.shut down (access or trunk port)
D.transition (the access port to a trunking port)

最新試題

Refer to the exhibit. What does the command channel-group 1 mode desirable do? () 

題型:單項選擇題

Refer to the exhibit. Which statement is true about the output?()

題型:單項選擇題

Refer to the exhibit. LACP has been configured on Switch1 as shown. Which is the correct command set to configure LACP on Switch2?()

題型:單項選擇題

Which statement is correct about the use of the virtual interface on a WLC ?()

題型:單項選擇題

Which three statements about STP timers are true?()

題型:多項選擇題

DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()

題型:單項選擇題

Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()

題型:單項選擇題

Which three statements are true of the Link Aggregation Control Protocol (LACP)?()

題型:多項選擇題

Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()

題型:多項選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項選擇題