A.The VLAN to instance mapping is a normal 16-byte field in the MST BPDU.
B.The VLAN to instance mapping is a normal 12-byte field in the MST BPDU.
C.The VLAN to instance mapping is a 16-byte MD5 signature field in the MST BPDU.
D.The VLAN to instance mapping is a 12-byte MD5 signature field in the MST BPDU.
您可能感興趣的試卷
你可能感興趣的試題
A.lowest root bridge ID
B.lowest path cost to root bridge
C.lowest sender bridge ID
D.highest port ID
E.highest root bridge ID
F.highest path cost to root bridge
A.VTPv3 supports 8K VLANs.
B.VTPv3 supports private VLAN mapping.
C.VTPv3 allows for domain discovery.
D.VTPv3 uses a primary server concept to avoid configuration revision issues.
E.VTPv3 is not compatible with VTPv1 or VTPv2.
F.VTPv3 has a hidden password option.
A. interface bandwidth
B. interface delay
C. interface bandwidth and delay
D. hop count
E. bridge priority
A. Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot
B. UDLD protects against STP failures caused by cabling problems that create one-way links.
C. Loop guard detects and protects against duplicate packets being received and transmitted on different ports
D. UDLD protects against unidirectional cabling problems on copper and fiber media.
E. Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.
A.followers field
B.MD5 digest
C.VLAN information
D.sequence number
最新試題
Which protocol and port have been assigned by IANA for RADIUS authentication?()
Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()
On the basis of the network provided in the exhibit, all routers are configured to run EIGRP on all links. If the link between PG-R1 and PG-R2 fails, what is the maximum number of queries PG-R3 will receive for 192.168.1.0/24, assuming that all the packets sent during convergence are transmitted once (there are no dropped or retransmitted packets)?()
Which command is used to enable SSM with the range 232.0.0.0 - 255.0.0.0?()
Which of these statements about penultimate hop popping are true?()
What is true about Unicast RPF in strict mode?()
Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()
Which message type is constructed and sent from an MSDP router to its MSDP peers when it receives a PIM register message knowing that the MSDP router is also configured as an RP for the PIM domain?()
An expanding company is deploying leased lines between its main site and two remote sites. Thebandwidth of the leased lines is 128kb/s each,terminated on different serial interfaces on the main router.These links are used for combined VOIP and data traffic. The network administrator has implemented a VOIP solution to reduce costs,and has therefore reserved sufficient bandwidth in a low latency queue oneach interface for the VOIP traffic. Users now complain about bad voice quality although no drops areobserved in the low latency queue. What action will likely fix this problem?()