Why would an administrator change the value of the spanning-tree priority of a switch?()A. in order to optimize the path that frames take from source to destinationB. to increase the priority so a designated port will become a root portC. to increase the

题目
Why would an administrator change the value of the spanning-tree priority of a switch?()

A. in order to optimize the path that frames take from source to destination

B. to increase the priority so a designated port will become a root port

C. to increase the BID, so the switch is more likely to become root bridge

D. in order to allow VLANs to be sent from one switch to another across a single link

E. to force a given switch to become an STP server


相似考题
更多“Why would an administrator change the value of the spanning-tree priority of a switch?() ”相关问题
  • 第1题:

    The OSPF process has been started and the networks have been configured for Area 0 as shown in the diagram. The network administrator has several options for configuring RouterB to ensure that it will be preferred as the designated router (DR) for the 172.16.1.0 /24 LAN segment. What configuration tasks could be used to establish this preference (Choose three.)()。

    A.Configure the priority value of the Fa0/0 interface of RouterB to a higher value than any other interface on the Ethernet network.

    B.Change the router id of Router B by assigning the IP address 172.16.1.130/24 to the Fa0/0 interface of RouterB.

    C.Configure a loopback interface on RouterB with an IP address higher than any IP address on the other routers.

    D.Change the priority value of the Fa0/0 interface of RouterB to zero.

    E.Change the priority values of the Fa0/0 interfaces of RouterA and RouterC to zero.

    F.No further configuration is necessary.


    参考答案:A, C, E

  • 第2题:

    What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()

    • A、lowest port MAC address
    • B、port priority number and MAC address.
    • C、VTP revision number
    • D、highest port priority number.
    • E、pathcost

    正确答案:E

  • 第3题:

    A port in a redundant topology is currently in the blocking state and is not receiving BPDUs. To ensure that this port does not erroneously transition to the forwarding state,  which command should be configured to satisfy the requirement?()

    • A、Switch(config)#spanning-tree loopguard default
    • B、Switch(config-if)#spanning-tree bdpufilter
    • C、Switch(config)#udld aggressive
    • D、Switch(config-if)#spanning-tree bpduguard

    正确答案:A

  • 第4题:

    Why would a network administrator configure port security on a switch?()

    • A、to prevent unauthorized Telnet access to a switch port
    • B、to limit the number of Layer 2 broadcasts on a particular switch port
    • C、to prevent unauthorized hosts from accessing the LAN
    • D、to protect the IP and MAC address of the switch and associated ports
    • E、to block unauthorized access to the switch management interfaces over common TCP ports

    正确答案:C

  • 第5题:

    The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()

    • A、BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. 
    • B、BPDU guard can guarantee proper selection of the root bridge.
    • C、BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.
    • D、BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.
    • E、None of the other alternatives apply

    正确答案:D

  • 第6题:

    Why would an administrator change the value of the spanning-tree priority of a switch?()

    • A、in order to optimize the path that frames take from source to destination
    • B、to increase the priority so a designated port will become a root port
    • C、to increase the BID, so the switch is more likely to become root bridge
    • D、in order to allow VLANs to be sent from one switch to another across a single link
    • E、to force a given switch to become an STP server

    正确答案:A

  • 第7题:

    The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()

    • A、Lower the bridge priority number.
    • B、Change the MAC address of the switch.
    • C、Increase the VTP revision number for the domain.
    • D、Lower the root path cost on the switch ports.
    • E、Assign the switch an IP address with the lowest value.

    正确答案:A

  • 第8题:

    单选题
    Why would an administrator change the value of the spanning-tree priority of a switch?()
    A

    in order to optimize the path that frames take from source to destination

    B

    to increase the priority so a designated port will become a root port

    C

    to increase the BID, so the switch is more likely to become root bridge

    D

    in order to allow VLANs to be sent from one switch to another across a single link

    E

    to force a given switch to become an STP server


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()
    A

     Lower the bridge priority number.

    B

     Change the MAC address of the switch.

    C

     Increase the VTP revision number for the domain.

    D

     Lower the root path cost on the switch ports.

    E

     Assign the switch an IP address with the lowest value.


    正确答案: E
    解析: 暂无解析

  • 第10题:

    单选题
    Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()
    A

    switchport priority extend trust

    B

    switchport priority extend cos 2

    C

    switchport priority extend cos 11

    D

    mls qos cos 2

    E

    mls qos cos 2 override


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()
    A

    lowest port MAC address

    B

    port priority number and MAC address.

    C

    VTP revision number

    D

    highest port priority number.

    E

    pathcost


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()
    A

    lowest port MAC address

    B

    port priority number and MAC address

    C

    VTP revision number

    D

    highest port priority number

    E

    path cost


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Why would a network administrator configure port security on a switch()。

    A.to prevent unauthorized Telnet access to a switch port

    B.to limit the number of Layer 2 broadcasts on a particular switch port

    C.to prevent unauthorized hosts from accessing the LAN

    D.to protect the IP and MAC address of the switch and associated ports

    E.to block unauthorized access to the switch management interfaces over common TCP ports


    参考答案:C

  • 第14题:

    Why would a network administrator configure port security on a switch?()

    • A、To prevent unauthorized Telnet access to a switch port.
    • B、To limit the number of Layer 2 broadcasts on a particular switch port.
    • C、To prevent unauthorized hosts from accessing the LAN.
    • D、To protect the IP and MAC address of the switch and associated ports.
    • E、To block unauthorized access to the switch management interfaces over common TCP ports.

    正确答案:C

  • 第15题:

    Which two statements are true when the extended system ID feature is enabled? ()

    • A、The BID is made up of the bridge priority value(two bytes) and bridge MAC address (six bytes).
    • B、The BID is made up of the bridge priority (four bits), the system ID (12 bits), and a bridge MAC address (48 bits).
    • C、The BID is made up of the system ID (six bytes) and bridge priority value (two bytes).
    • D、The system ID value is the VLAN ID (VID).
    • E、The system ID value is a unique MAC address allocated from a pool of MAC addresses assigned to the switch or module.
    • F、The system ID value is a hex number used to measure the preference of a bridge in the spanning-tree algorithm.

    正确答案:B,D

  • 第16题:

    What are two things that an access point (AP) does when it receives an 802.11 frame from a Wi-Fi Multimedia (WMM) client? ()

    • A、EAP-FASTEAP-FAS Access Point Protocol (LWAPP) packet is used to generate an 802.1 p priority value in the packets, which are sent to an Ethernet switch by the controllers.
    • B、The AP will police the 802.1 le priority value to ensure it does not exceed the maximum value allowed for the QoS policy that is assigned to that client.
    • C、Once the LWAPP packet is received, the AP generates the IEEE 802.1 p priority value.
    • D、The AP will map the 802.11e priority value to the DSCP value.
    • E、The AP will map the DSCP value to the outer LWAPP frame.

    正确答案:B,D

  • 第17题:

    What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()

    • A、path cost
    • B、lowest port MAC address
    • C、VTP revision number
    • D、highest port priority number
    • E、port priority number and MAC address

    正确答案:A

  • 第18题:

    What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()

    • A、lowest port MAC address
    • B、port priority number and MAC address.
    • C、VTP revision number
    • D、highest port priority number.
    • E、path cost

    正确答案:E

  • 第19题:

    单选题
    The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()
    A

    Lower the bridge priority number.

    B

    Change the MAC address of the switch.

    C

    Increase the VTP revision number for the domain.

    D

    Lower the root path cost on the switch ports.

    E

    Assign the switch an IP address with the lowest value.


    正确答案: E
    解析: 暂无解析

  • 第20题:

    单选题
    What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()
    A

    lowest port MAC address

    B

    port priority number and MAC address.

    C

    VTP revision number

    D

    highest port priority number.

    E

    path cost


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()
    A

    path cost

    B

    lowest port MAC address

    C

    VTP revision number

    D

    highest port priority number

    E

    port priority number and MAC address


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Why would a network administrator configure port security on a switch()。
    A

    to prevent unauthorized Telnet access to a switch port

    B

    to limit the number of Layer 2 broadcasts on a particular switch port

    C

    to prevent unauthorized hosts from accessing the LAN

    D

    to protect the IP and MAC address of the switch and associated ports

    E

    to block unauthorized access to the switch management interfaces over common TCP ports


    正确答案: E
    解析: 暂无解析

  • 第23题:

    单选题
    Why would a network administrator configure port security on a switch?()
    A

    To prevent unauthorized Telnet access to a switch port.

    B

    To limit the number of Layer 2 broadcasts on a particular switch port.

    C

    To prevent unauthorized hosts from accessing the LAN.

    D

    To protect the IP and MAC address of the switch and associated ports.

    E

    To block unauthorized access to the switch management interfaces over common TCP ports.


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()
    A

    BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. 

    B

    BPDU guard can guarantee proper selection of the root bridge.

    C

    BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.

    D

    BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.

    E

    None of the other alternatives apply


    正确答案: D
    解析: 暂无解析