A.routing issue
B.denial-of-service attack
C.MAC flooding
D.spanning-tree recalculation
E.Layer 2 loop
F.ARP spoofing attack
您可能感興趣的試卷
你可能感興趣的試題
A.LDAP
B.ICMP
C.RTP
D.BGP
E.SSH
F.RDP
A.qos-group
B.DSCP
C.LFI
D.NBAR
A.A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.
B.A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.
C.A sham-link is a logical link between PE routers that carries OSPF LSAs and forwards customer traffic across it.
D.A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.
E.A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.
A.Both RTA and RTB will do LSA7/5 translation,since they are both NSSA ABRs
B.RTA will do LSA7/5 translation,since it has the lower router ID
C.RTB will do LSA7/5 translation,since it has the higher router ID
D.The redistributing router will do LSA7/5 translation,since it is within the NSSA
A.It enables provider edge (PE) specific checks on a router when the OSPF process is associated with the VRF
B.It disables provider edge (PE) specific checks on a router when the OSPF process is associated with the VRF
C.It enables the exchange of the "VRF-Lite" capability when the OSPF adjacency is formed.
D.It disables the MPLS processing on the OSPF learned routes inside the VRF
最新試題
Which statement is true of a source that wants to transmit multicast traffic to group 239.1.1.1?()
Which statement best describes OSPF external LSAs (type 5)?()
For the following ports, which port is on every bridge in a Spanning Tree Protocol IEEE 802.1w network except the root bridge?()
When two bridges are competing for the root bridge of an IEEE 802.1D spanning tree and both have the same bridge priority configured, which parameter determines the winner?()
For the following items,what is the mathematical relationship between the committed information rate (CIR), committed burst (Bc), and committed rate measurement interval (Tc)?()
Which switch port error is an indication of duplex mismatches on 10/100/1000 IEEE 802.3u Gigabit Ethernet ports?()
You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining that access to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue, and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely the cause of this issue?()
For the following protocols, which one provides a mechanism to transparently intercept and redirect CIFS traffic from a client to a local Cisco Wida Area Application engine?()
Which message type is constructed and sent from an MSDP router to its MSDP peers when it receives a PIM register message (knowing that the MSDP router is also configured as an RP for the PIM domain)?()
An administrator of a peer-to-peer server application reports that the maximum bandwidth that his application receives is 90 Mb/s. You have an 8-port,100-Mb/s EtherChannel bundle on the switching infrastructure between the two servers, resulting in a bidirectional throughput of more than what is recorded. Which two solutions would allow for more bandwidth for the application?()