BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network.
BPDU guard can guarantee proper selection of the root bridge.
BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.
BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.
None of the other alternatives apply
第1题:
A. Interfaces will automatically detect and build adjacencies with neighbor routers
B. DR and BDR elections will not occur
C. DR and BDR elections will occur
D. The neighbor command is required to build adjacencies
E. All routers must be configured in a fully meshed topology with all other routers
第2题:
Which spanning-tree command would cause a PortFast-enabled interface to lose its PortFast-operational status and disable BPDU filtering if it receives BPDUs?()
第3题:
The network administrator has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. The network administrator checks the port connecting the new switch to the core switch and sees the following information:Which of the following is the MOST likely cause of the slow connections?()
A. The servers have not had VLAN tagging enabled on their NICs.
B. Speed and duplex have not been set.
C. VLAN tagging was not set on the trunk.
D. The servers have been connected with CAT5 cable.
第4题:
What is the result of entering the command spanning-tree loopguard default?()
第5题:
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()
第6题:
Which of the following characteristics describe the BPDU Guard feature()
第7题:
Which of the following characteristics describe the BPDU Guard feature?(Choose all that apply.)()
第8题:
You are a network administrator for Ezonexam.com's Windows 2000 network.
Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.
Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."
What should you do?
A.Use System File Checker (SFC) to decrypt the file.
B.Log on the network as the Recovery Agent. Decrypt the files for the manager.
C.Log on the network as the administrator. Use the cipher command to decrypt the files.
D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.
第9题:
The network administrator has enabled BPDU guard on the LAN. Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()
第10题:
Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()