多项选择题
Which two values are used by Spanning Tree Protocol to elect a root bridge?()
A.amount of RAM
B.bridge priority
C.IOS version
D.IP address
E.MAC address
F.speed of the links
相关考题
-
多项选择题
What are two advantages of Layer 2 Ethernet switches over hubs?()
A.decreasing the number of collision domains
B.filtering frames based on MAC addresses
C.allowing simultaneous frame transmissions
D.increasing the size of broadcast domains
E.increasing the maximum length of UTP cabling between devices -
多项选择题
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。
A.Switch1(config-if)# switchport port-security maximum 1
B.Switch1(config)# mac-address-table secure
C.Switch1(config)# access-list 10 permit ip host
D.Switch1(config-if)# switchport port-security violation shutdown
E.Switch1(config-if)# ip access-group 10 -
单项选择题
Refer to the exhibit.Based on the exhibited routing table,how will packets from a host within the192.168.10.192/26 LAN be forwarded to 192.168.10.1?()
A.The router will forward packets from R3 to R2 to R1
B.The router will forward packets from R3 to R1
C.The router will forward packets from R3 to R1 to R2
D.The router will forward packets from R3 to R2 to R1 AND from R3 to R1
