单项选择题X 纠错
A. associate interface E2/11 to community VLANs 14 and 50
B. associate interface E2/11 to secondary VLANs 14 and 50
C. associate interface E2/11 to primary VLAN 50 and secondary VLAN 14
D. associate interface E2/11 to primary VLAN 14 and secondary VLAN 50
你可能喜欢
多项选择题
A. Port priority value can be configured between 1 and 65535.
B. A higher port priority value means a higher priority of LACP.
C. Port priority can be configured so that specific links can be chosen as active links rather than the hot standby links within the port channel.
D. LACP uses the port priority with the port number to form the port identifier.
E. LACP Port priority default value should always be changed
单项选择题
A. Cisco AV-pair
B. TACACS+ or RADIUS ack frame role attribute
C. DH-CHAP challenge attribute
D. privilege level attribute
多项选择题
A. Graceful consistency check is enabled by default.
B. When graceful consistency check is enabled, only the links on the secondary peer device are suspended.
C. Graceful consistency check is disabled by default, so to enable this feature, use graceful consistency-check command under VPC domain configuration mode.
D. When graceful consistency check is enabled, only the inconsistent VLANs on the secondary peer device are suspended.
多项选择题
A. A single VACL can be shared across two or more VDCs.
B. Use of VACLs requires no special license to be installed.
C. VACLs make use of IP or MAC ACLs.
D. Only options drop and forward are permitted.
多项选择题
A. Adjacency Server is required when OTV is deployed with unicast-only transport.
B. Adjacency Server is required when OTV is deployed with multicast-enabled transport.
C. Each OTV device wishing to join a specific OTV logical overlay needs to first register with the Adjacency Server.
D. Each OTV device trying to join a specific OTV logical overlay needs to be configured as an Adjacency Server.
多项选择题
A. NMAC-SHA-96 authentication protocol
B. HMAC-MD5-96 authentication protocol
C. Community String Match protocol
D. NMAC-MD5-96 authentication protocol
E. HMAC-SHA-96 authentication protocol
单项选择题
A. GLBP redirect timer
B. GLBP forwarder pre-empt delay minimum timer
C. GLBP hold timer
D. GLBP pre-empt delay minimum timer
E. GLBP extended hold timer
F. GLBP nonstop forwarding timer
单项选择题
A. DSA key generated with 512 bits
B. RSA key generated with 768 bits
C. RSA key generated with 1024 bits
D. DSA key generated with 1024 bits
E. RSA key generated with 2048 bits
多项选择题
A. Root priority
B. System ID
C. Bridge ID
D. Switch ID
E. Port ID
F. Subswitch ID
单项选择题
A. The request is placed in the transactor queue in FIFO order and the management information tree is updated.
B. The request is placed in the replicator and persistifier and the store is updated.
C. The request is placed in the data management engine and the application gateway is updated.
D. The request is placed in the buffer queue and the commit buffer queue is updated.