單項選擇題In 802.1s, how is the VLAN to instance mapping represented in the BPDU?()

A.The VLAN to instance mapping is a normal 16-byte field in the MST BPDU.
B.The VLAN to instance mapping is a normal 12-byte field in the MST BPDU.
C.The VLAN to instance mapping is a 16-byte MD5 signature field in the MST BPDU.
D.The VLAN to instance mapping is a 12-byte MD5 signature field in the MST BPDU.


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which three options are considered in the spanning-tree decision process?()

A.lowest root bridge ID
B.lowest path cost to root bridge
C.lowest sender bridge ID
D.highest port ID
E.highest root bridge ID
F.highest path cost to root bridge

2.多項選擇題Which three options are features of VTP version 3?()

A.VTPv3 supports 8K VLANs.
B.VTPv3 supports private VLAN mapping.
C.VTPv3 allows for domain discovery.
D.VTPv3 uses a primary server concept to avoid configuration revision issues.
E.VTPv3 is not compatible with VTPv1 or VTPv2.
F.VTPv3 has a hidden password option.

3.單項選擇題Spanning Tree Protocol calculates path cost based on which of these? ()

A. interface bandwidth
B. interface delay
C. interface bandwidth and delay
D. hop count
E. bridge priority

4.多項選擇題Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()

A. Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot
B. UDLD protects against STP failures caused by cabling problems that create one-way links.
C. Loop guard detects and protects against duplicate packets being received and transmitted on different ports
D. UDLD protects against unidirectional cabling problems on copper and fiber media.
E. Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

5.多項選擇題Which two options are contained in a VTP subset advertisement?()

A.followers field
B.MD5 digest
C.VLAN information
D.sequence number

最新試題

In PIM-SM what control plane signaling must a multicast source perform before it begins to send multicasttraffic to a group?()

題型:單項選擇題

All of these are fundamental building blocks of differentiated services Traffic Conditioner Block exceptwhich one?()

題型:單項選擇題

Which of these statements about penultimate hop popping are true?()

題型:多項選擇題

You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()

題型:單項選擇題

What is also called Type 0 authentication in OSPF on Cisco Routers?()

題型:單項選擇題

What is the command to configure RSVP to reserve up to one-tenth of a Gigabit link,but only allow eachindividual flow to use 1 MB/s?()

題型:單項選擇題

Which three message types are valid PIMv2 message types?()

題型:多項選擇題

Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()

題型:多項選擇題

Which three protocols or applications should be placed in a class that is configured with WRED?()

題型:多項選擇題

Which two are differences between IGMPv2 and IGMPv3 reports?()

題型:多項選擇題