Refer to the exhibit. The Layer 2 network uses VTP to manage its VLAN database. A network designer created all VLANs on the VTP server (switch 1) and it has been advertised through VTP to all other VTP clients (switches 2 through 4). Due to network growth, a network operator decided to add a new switch between switch 1 and switch 3. The network operator has been instructed to use a refurbished switch and use a VTP client. Which three of these factors should the network operator consider to minimize the impact of adding a new switch?()
A. Pay special attention to the VTP revision number, because the higher value takes the priority.
B. Configure all VLANs manually on the new switch in order to avoid connectivity issues.
C. A trunk should be established between the new switch and switches 1 and 3 as VTP only runs over trunk links.
D. Set at least the VTP domain name and password to get the new switch synchronized.
E. An ISL trunk should be established between the new switch and switches 1 and 3, because VTP only runs over ISL.
F. Pay special attention to the VTP revision number, because the lower value takes the priority.
您可能感兴趣的试卷
你可能感兴趣的试题
A.It is used in multihome network scenarios.
B.It can be used with BGP to mitigate DoS and DDoS.
C.It does not need to have CEF enabled.
D.It is enabled via the interface level command ip verify unicast reverse-path.
E.It cannot be used with "classification" access lists.
A.Do not enable all the signatures at the same time.
B.Do not enable the ICMP signature.
C.Disable the Zone-Based Policy Firewall because it is not compatible with Cisco IOS IPS.
D.Disable CEF because it is not compatible with Cisco IOS IPS. .
A.It is a Cisco proprietary protocol.
B.It runs on TCP port 59. .
C.Authentication and authorization are done at different stages.
D.TACACS+ encrypts the entire body of the packet, but leaves a standard TACACS+ header.
E.It is an industry standard protocol.
F.TACACS+ encrypts both the entire body of the packet and the TACACS+ header.
A.it is used for load balancing in bidirectional PIM
B.it is used for redundancy in bidirectional PIM
C.it is used for redundancy in PIM-SM
D.it is used for load balancing in PIM-SM
Refer to the exhibit. Look at the command output. What can you use to prevent this behavior? ()
A. UDLD (UniDirectional Link Detection)
B. spanning-tree loopguard
C. VTP mode transparent
D. switchport mode desirable
A.Membership Query
B.Membership Report
C.Membership Delay
D.Backward Compatible IGMPv1 Report Message
A.Source Specific Multicast and IGMPv2
B.Announcing multicast sources to BGP speakers
C.Anycast RP
D.Intradomain multicast routing
Refer to the exhibit. Look at the command output. Assume that there is no other path, and the configuration is correct. What would be the consequences of this situation?()
A. Users in SW1 can ping SW2 but not vice versa.
B. Users in SW2 can ping SW1 but not vice versa.
C. Users in SW1 and SW2 can ping each other.
D. Users in SW1 and SW2 cannot ping each other.
A.to prevent multicast packets from looping
B.to prevent PIM packets from looping
C.to instruct PIM where to send a (*, G) or (S, G) join message
D.to prevent multicast packets from looping and to instruct PIM where to send a (*, G) or (S, G) joinmessage
A.232.0.0.0/8
B.239.0.0.0/8
C.232.0.0.0/4
D.FF3x::/32
E.FF2x::/32
F.FF3x::/16
最新试题
In PIM-SM what control plane signaling must a multicast source perform before it begins to send multicasttraffic to a group?()
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()
The classic Spanning Tree Protocol (802.1 D 1998) uses which sequence of variables to determine thebest received BPDU?()
What is true about Unicast RPF in strict mode?()
Which three message types are valid PIMv2 message types?()
Spanning Tree Protocol IEEE 802.1 s defines the ability to deploy which of these?()
Which multicast address is reserved for cisco-rp-discovery?()
How does an IPv6 router deal with a packet that is larger than the outgoing interface MTU?()
You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()
Which two are differences between IGMPv2 and IGMPv3 reports?()