While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop.
Which of these can you implement to prevent future occurrences of this issue?()
A.RSTP
B.root guard
C.BPDU guard
D.GLBP
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. MPLS has been enabled on router PE11. Which of these statements is correct regarding the output display shown in the exhibit? ()
A. CEF switching is not needed for MPLS operation.
B. CEF switching is only needed to forward labeled packets.
C. CEF switching is needed on both ingress and egress interfaces on which MPLS is enabled.
D. Interface-level CEF switching is needed only on egress interfaces that are sending IP packets on which the egress LSR performs the label imposition process.
E. Interface-level CEF switching is needed only on ingress interfaces that are receiving IP packets on which the ingress LSR performs the label imposition process.
A. If using IS-IS as the PE-CE routing protocol, no redistribution is required.
B. If using static routes between the CE and PE routers, no redistribution of other VPN routes is required.
C. If the PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required.
D. If RIP is the routing protocol that is used between the PE-CE routers, no redistribution is required, but any other protocol will require redistribution.
E. If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution.
A. NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.
B. NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.
C. NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.
D. NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.
A. Layer 2 TTL
B. Layer 3 TTL
C. Layer 3 source address
D. Layer 3 transport protocol
E. Layer 3 destination address
A.interfacevlan100ipaccess-grouptest
B.interfacevlan100ipaccess-grouptestin
C.interfacevlan100ipaccess-grouptestout
D.vlanfiltertestvlan-list100
E.vlanaccess-maptest100
A. by snooping the CoS marking on the incoming frames
B. by using RTP hello messages between the switch port and the Cisco IP Phone
C. by using CDP
D. by using DHCP snooping
E. by snooping the incoming 802.1Q VLAN tag
Refer to the exhibit. Users complain that they intermittently lose data and connections to important servers. After investigation, you discover that the 802.1Q trunk between DSW111 and ASW1 is down.
Even though the HSRP group 11 is being serviced by DSW112, you discover that the SVI for VLAN 11 is in the up state on DSW111.
Which three Cisco Catalyst IOS commands should you use on DSW111 to find the source of this problem? ()(Choose three.)
A. show vtp status
B. show interfaces vlan 11
C. show standby vlan 11 brief
D. show spanning-tree vlan 11
E. show interfaces
A. document power and UPS availability
B. to integrate routing and switching components
C. create a design specification document
D. document the customer's current and future technology projects
A. Implement threshold monitoring using RMON.
B. Implement monitoring using SNMP or RMON.
C. Poll and record specific SNMP MIB objects from the device.
D. Verify that SNMP MIB is supported in the relevant core device.
A. data center
B. teleworker
C. branch
D. campus
最新試題
Which three of these items are IPv6 transition mechanisms? ()(Choose three.)
On the Catalyst 6500 Series switch, which command is used to establish a console connection to the Firewall Services Module?()
Refer to the exhibit. Which SSH sessions will the SSH server accept?()
With a VPN Accelerator Module 2+ (VAM2+) installed in a Cisco 7200 series router, what will be the resulting action when entering the command no crypto engine accelerator slot number?()
Which description is making sense on the basis of the given information?()
What is the purpose of using VPN hardware acceleration equipment?()
Which keyword is used with the debug ipv6 [keyword] command to troubleshoot neighbor discovery problems?()
In a high-availability network, which command, when placed on ports that have connected end stations, will allow you to prevent delays in service for end stations by placing a port in blocking mode?()
Refer to the exhibit. Which two of these statements are correct? (Choose two.)()
Which of the following is an easy-to-use tool that allows you to easily configure and monitor Cisco Integrated Services Routers?()