單項(xiàng)選擇題What is the recommended practice regarding UDLD when implementing it in all fiber-optic LAN ports?()

A. Adjust the default hello timers to three seconds for aggressive mode.
B. Enable it in global mode and on every interface you need to support.
C. Enable it in global mode to support every individual fiber-optic interface.
D. Enable it to create channels containing up to eight parallel links between switches.
E. Enable it in global mode to support every individual fiber optic and Ethernet interface.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two of these are recommended practices with trunks? ()

A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

2.單項(xiàng)選擇題Why is STP required when VLANs span access layer switches?()

A. to ensure a loop-free topology
B. to protect against user-side loops
C. in order to support business applications
D. because of the risk of lost connectivity without STP
E. for the most deterministic and highly available network topology

3.單項(xiàng)選擇題When is a first-hop redundancy protocol needed in the distribution layer?()

A. when HSRP is not supported by the design
B. when multiple vendor devices need to be supported
C. when preempt tuning of the default gateway is needed
D. when a robust method of backing up the default gateway is needed
E. when the design implements Layer 2 between the access switch and the distribution switch
F. when the design implements Layer 3 between the access switch and the distribution switch

4.單項(xiàng)選擇題Which of these recommended designs provides the highest availability?()

A. map the Layer 2 VLAN number to the Layer 3 subnet
B. control route propagation to edge switches using distribute lists
C. use a Layer 2 distribution interconnection link with HSRP or GLBP
D. use a Layer 3 distribution interconnection link with HSRP or GLBP
E. use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP

5.單項(xiàng)選擇題Which of these is a correct description of SSO?()

A. It will only become active after a software failure.
B. It will only become active after a hardware failure.
C. It requires that Cisco NSF be enabled in order to work successfully.
D. It synchronizes the MAC, FIB, and adjacency tables between Active and Standby Route Processors.

最新試題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:單項(xiàng)選擇題

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

題型:單項(xiàng)選擇題

Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Which two statements about the topologies shown are correct?()

題型:多項(xiàng)選擇題

Which technology allows centralized storage services to be shared across different VSANs?()

題型:單項(xiàng)選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項(xiàng)選擇題

You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()

題型:單項(xiàng)選擇題

Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.

題型:單項(xiàng)選擇題

Which three of these are important when determining NAS Server scaling? ()

題型:多項(xiàng)選擇題

An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()

題型:單項(xiàng)選擇題