A.when they receive a special token
B.when there is a carrier
C.when they detect no other devices are sending
D.when the medium is idle
E.when the server grants access
您可能感興趣的試卷
你可能感興趣的試題
A.They increase the size of collision domains.
B.They allow logical grouping of users by function.
C.They can enhance network security.
D.They increase the size of broadcast domains while decreasing the number of collision domains.
E.They increase the number of broadcast domains while decreasing the size of the broadcast domains.
F.They simplify switch administration.
A.A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure
B.Broadcast storms can be mitigated by decreasing the number of broadcast domains,thus increasing their size.
C.A higher level of network security can be reached by separating sensitive data traffic from other network traffic.
D.Port-based vlans increase switch-port use efficient,thanks to 802.1Q trunks
E.A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure.
F.Broadcast storms can be mitigated by increasing the number of broadcast domains,thus reducing their size.
G.VLANs make it easier for IT staff to configure new logical groups,because the vlans all belong to the same broadcast domain.
A.More collision domains will be created.
B.IP address utilization will be more efficient.
C.More bandwidth will be required than was needed previously.
D.An additional broadcast domain will be created.
A.32768: 11-22-33-44-55-66
B.32768: 22-33-44-55-66-77
C.32769: 11-22-33-44-55-65
D.32769: 22-33-44-55-66-78
A.802.1d
B.VTP
C.802.1q
D.STP
E.SAP
A.It designates VLAN 999 for untagged traffic.
B.It blocks VLAN 999 traffic from passing on the trunk.
C.It creates a VLAN 999 interface.
D.It designates VLAN 999 as the default for all unkown tagged traffic.
Refer to the exhibit.Switch-1 needs to send data to a host with a MAC address of 00b0.d056.efa4.What will Switch-1 do with this data?()
A.switch-1 will drop the data because it dose not have an entry for that MAC address
B.switch-1 will flood the data out all of its port from which the data originated
C.switch-1 will forward the data to its default gateway
D.tch-1 will send an ARP request out all its ports except the port from which the data originated
A.lowest port MAC address
B.port priority number and MAC address.
C.VTP revision number
D.highest port priority number.
E.path cost
Refer to the exhibit. Based on the information given. Which switch will be elected root bridge and why?()
A.Switch A ,because it has the lowest MAC address
B.Switch C,because it has the lowest priority
C.Switch B,because it has the highest MAC address
D.Switch C,because it is the most centrally located switch
E.Switch A,because it is the most centrally located switch
F.Switch D,because it has the highest priority
A.to uniquely identify devices at Layer 2
B.to allow communication with devices on a different network
C.to differentiate a Layer 2 frame from a Layer 3 packet
D.to establish a priority system to determine which device gets to transmit first
E.to allow communication between different devices on the same network
F.to allow detection of a remote device when its physical address is unknown
最新試題
What Netflow component can be applied to an interface to track IPv4 traffic?()
Which statement describes VRRP object tracking?()
A network administrator creates a layer 3 EtherChannel, bundling four interfaces into channel group 1. On what interface is the IP address configured?()
What are the Popular destinations for syslog messages to be saved? ()
What are the three things that the Netflow uses to consider the traffic to be in a same flow ?()
What are three reasons to collect Netflow data on a company network?()
Which one of these is a valid HSRP Virtual Mac Address?()
Which three features are added in SNMPv3 over SNMPv2? ()
A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? ()
What command instructs the device to timestamp Syslog debug messages in milliseconds?()