單項(xiàng)選擇題Spanning Tree Protocol IEEE 802.1s defines the ability to deploy which of these? ()

A.one global STP instance for all VLANs
B.one STP instance for each VLAN
C.one STP instance per set of VLANs
D.one STP instance per set of bridges


您可能感興趣的試卷

你可能感興趣的試題

2.單項(xiàng)選擇題Two routers configured to run BGP have been connected to a firewall,one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer,including the correct BGP session endpoint addresses and the correct BGP session hop-count limit (EBGP multihop). What is a good first test to see if BGP will work across the firewall?()

A.Attempt to TELNET from the router connected to the inside of the firewall to the router connected to the outside of the firewall.If telnet works,BGP will work,since telnet and BGP both use TCP to transport data
B.Ping from the router connected to the inside interface of the firewall to the router connected to the outside interface of the firewall.If you can ping between them,BGP should work,since BGP uses IP to transport packets
C.There is no way to make BGP work across a firewall without special configuration,so there is no simple test that will show you if BGP will work or not,other than trying to start the peering session
D.There is no way to make BGP work across a firewall

3.單項(xiàng)選擇題Which statement correctly describes the disabling of IP TTL propagation in an MPLS network?()

A.The TTL field from the IP packet is copied into the TTL field of the MPLS label header at the ingress edge LSR
B.TTL propagation cannot be disabled in an MPLS domain
C.TTL propagation is only disabled on the ingress edge LSR
D.The TTL field of the MPLS label header is set to 255
E.The TTL field of the IP packet is set to 0

4.單項(xiàng)選擇題Which of these is mandatory when configuring Cisco IOS Firewall? ()

A.Cisco IOS IPS enabled on the untrusted interface
B.NBAR enabled to perform protocol discovery and deep packet inspection
C.a route map to define the trusted outgoing traffic
D.a route map to define the application inspection rules
E.an inbound extended ACL applied to the untrusted interface