單項(xiàng)選擇題Which command is used to enable EtherChannel hashing for Layer 3 IP and Layer 4 port-based CEF?()

A.mpls ip cef
B.port-channel ip cef
C.mpls ip port-channel cef
D.port-channel load balance
E.mpls ip load-balance
F.ip cef EtherChannel channel-id XOR L4
G.ip cef connection exchange


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit. In the diagram, the switches are running IEEE 802.1s MST. Which ports are in the MST blocking state?()

A. GE-1/2 and GE 2/1
B. GE-1/1 and GE-2/2
C. GE-3/2 and GE 4/1
D. no ports are in the blocking state
E. There is not enough information to determine which ports are in the blocking state.

2.單項(xiàng)選擇題Which statement is true about TCN propagation?()

A.The originator of the TCN immediately floods this information through the network.
B.The TCN propagation is a two step process.
C.A TCN is generated and sent to the root bridge.
D.The root bridge must flood this information throughout the network.

3.單項(xiàng)選擇題

Refer to the exhibit. Catalyst R is the root bridge for both VLAN 1 and VLAN 2.What is the easiest way to load-share traffic across both trunks and maintain redundancy in case a link fails,without using any type of EtherChannel link-bundling?()

A. Increase the root bridge priority (increasing the numerical priority number) for VLAN 2 on Catalyst D so that port D2 becomes the root port on Catalyst D for VLAN 2.
B. Decrease the port priority on R2 for VLAN 2 on Catalyst R so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1.
C. Decrease the path cost on R2 on Catalyst R for VLAN 2 so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1.
D. Increase the root bridge priority (decreasing the numerical priority number) for VLAN 2 on Catalyst R so that R2 becomes the root port on Catalyst D for VLAN 2.

4.單項(xiàng)選擇題Which statement is true about loop guard?()

A.Loop guard only operates on interfaces that are considered point-to-point by the spanning tree.
B.Loop guard only operates on root ports.
C.Loop guard only operates on designated ports.
D.Loop guard only operates on edge ports.

5.單項(xiàng)選擇題Why would a rogue host that is running a DHCP server on a campus LAN network present a security risk?()

A.It may allocate IP addresses from an unknown subnet to the users.
B.All multicast traffic can be sniffed by using the DHCP multicast capabilities.
C.The CPU utilization of the first hop router can be overloaded by exploiting DHCP relay open ports.
D.A potential man-in-the-middle attack can be used against the clients.

最新試題

Which three message types are valid PIMv2 message types?()

題型:多項(xiàng)選擇題

What is the correct command to set the router ID for an OSPFv3 process?()

題型:單項(xiàng)選擇題

Which of the following is true about the MPLS header and its EXP field size?()

題型:單項(xiàng)選擇題

Which two statements are true about RED?()

題型:多項(xiàng)選擇題

Which protocol and port have been assigned by IANA for RADIUS authentication?()

題型:單項(xiàng)選擇題

In GLBP,which router will answer on client ARP requests?()

題型:單項(xiàng)選擇題

When STP UplinkFast is enabled on a switch utilizing the default bridge priority, what will the new bridgepriority be changed to?()

題型:單項(xiàng)選擇題

In order to configure two routers as anycast RPs, which of these requirements, af a minimum, must besatisfied?()

題型:單項(xiàng)選擇題

In PIM-SM what control plane signaling must a multicast source perform before it begins to send multicasttraffic to a group?()

題型:單項(xiàng)選擇題

Which three options are valid ways to filter routes from a BGP peer?()

題型:多項(xiàng)選擇題