多項選擇題Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)()。

A.amount of RAM
B.bridge priority
C.IOS version
D.IP address
E.MAC address
F.speed of the links


您可能感興趣的試卷

你可能感興趣的試題

4.單項選擇題A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?()

A.This is a 10 Mb/s switch port.
B.This is a 100 Mb/s switch port.
C.This is an Ethernet port operating at half duplex.
D.This is an Ethernet port operating at full duplex.
E.This is a port on a network interface card in a PC

5.單項選擇題Which spread spectrum technology does the 802.11b standard define for operation?()

A.IR
B.DSSS
C.FHSS
D.DSSS and FHSS
E.IR, FHSS, and DSSS 

7.多項選擇題What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

A.Allow unrestricted access to the console or VTY ports.
B.Use a firewall to restrict access from the outside to the network devices.
C.Always use Telnet to access the device command line because its data is automatically encrypted.
D.Use SSH or another encrypted and authenticated transport to access device configurations.
E.Prevent the loss of passwords by disabling password encryption. 

最新試題

At which layer of the OSI model dose PPP perform?()

題型:單項選擇題

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()

題型:單項選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:單項選擇題

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

題型:單項選擇題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項選擇題

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

題型:單項選擇題

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

題型:單項選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:單項選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項選擇題