Refer to the exhibit. Based upon the output of show vlan on switch CAT2, what can we concludeabout interfaces Fa0/13 and Fa0/14?()
A.that interfaces Fa0/13 and Fa0/14 are in VLAN 1
B.that interfaces Fa0/13 and Fa0/14 are down
C.that interfaces Fa0/13 and Fa0/14 are trunk interfaces
D.that interfaces Fa0/13 and Fa0/14have a domain mismatch with another switch
E.that interfaces Fa0/13 and Fa0/14have a duplex mismatch with another switch
您可能感興趣的試卷
你可能感興趣的試題
Refer to the show interface Gi0/1 switchport command output shown in the exhibit. Which twostatements are true about this interface?()
A.This interface is a member of a voice VLAN
B.This interface is a dot1q trunk passing all configured VLANs
C.This interface is a member of VLAN7
D.This interface is configured for access mode
E.This interface is a member of VLAN1
A.show spantree backbonefast
B.show spantree statistics
C.show spantree uplinkfast
D.show spantree blockedports
E.show spantree portstate
F.show spantree portvlancost
The network is displayed in the diagram below:
You use the following information for switch SWA:
Port Mode Encapsulation Status Native VLAN
fa0/1 desirable n-802.1q trunking 5
Port VLANs is allowed on trunk
fa0/ 1 1-100, 102-1005
Port VLANs is owned and active in management domain
fa0/1 1-6. 8-100, 102-115, 197-999, 1002-1005
Port VLANs in spanning tree forwarding state and not pruned
fa0/1 1-6, 8-100, 102-105, 108-999, 1002-1005
SW users in VLAN 107 complain that they are unable to gain access to the resources through theSW1 router.
What is the cause of this problem?()
A.VLAN 107 is not configured on the trunk
B.VLAN 107 does not exist on switch SWA
C.VTP is pruning VLAN 107
D.Spanning tree is not enabled on VLAN 107
E.None of the other alternatives apply
A.Combine all the VLAN spanning trees into a single spanning tree
B.Set forward delay and max-age timers to the maximum possible values
C.None of the choices
D.Change the router VTP server mode
E.Disable the root bridge
Exhibit
SW1#show spanning-tree vlan 200
VLAN200
Spanning tree enabled protocol iee
eRoot ID Priority 32968
Address 000c.ce29.ef00
Cost 19
Port 2 (FastEthernet0/2)
Hello time 10 Sec Max Age 20 sec Forward Delay 30 sec
Bridge ID Priority 32968 (priority 32768 sys-id-ext 200)
Address 000c.ce2a.4180
Hello Time 2 sec Max Age 20 Sec Forward Delay 15 sec
Interface Role Sts Cost PrioNbr Type
Fa0/2 Root FWD 19 128.2 P2p
Fa0/3 Altn BLK 19 128.3 P2p
Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statementsabout the STP process for VLAN 200 are true?()
A.BDPUs will be sent out every two seconds
B.The time spent in the listening state will be 30 seconds
C.The time spent in the learning state will be 15 seconds
D.The maximum length of time that the BPDU information will be saved is 30 seconds
E.This switch is the root bridge for VLAN 200
F.BPDUs will be sent out every 10 seconds
最新試題
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()
Refer to the exhibit. Which two statements about the AAA configuration are true?()
Network Topology Exhibit:Configuration Exhibit:NET(config)# access-list 112 deny icmp any any echo logNET(config)# access-list 112 deny imp any any redirect logNET(config)# access-list 112 deny icmp any any mask-request logNET(config)# access-list 112 permit icmp any 10.1.1.0 0.0.0.255NET(config)# interface Fa0/1NET(config-if)# ip access-group 112 inYou work as a network administrator at networkTut.com, study the exhibit carefully. Theconfiguration has been applied to router NET to mitigate the threat of certain types of ICMPbasedattacks while allowing some ICMP traffic to the corporate LAN to work. However, the configurationis incorrect. On the basis of the information in the exhibit, which configuration option wouldcorrectly configure router NET?()
Drag and drop each management protocol on the above to the correct category on the below.
Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()
Match the xDSL type on the above to the most appropriate implementation on the below.
In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()
Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)
Drag and drop question. The upper gives the MPLS functions, the bottom describes the planes.Drag the above items to the proper location at the below
As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()