多项选择题
The Company network utilizes the Multiple-instance Spanning Tree protocol in its switched LAN.
Which three statements about the MST protocol (IEEE 802.1S) are true? ()
A. To verify the MST configuration, the show pending command can be used in MST configuration mode.
B. When RSTP and MSTP are configured; UplinkFast and BackboneFast must also be enabled.
C. All switches in the same MST region must have the same VLAN-to-instance mapping, but different configuration revision numbers.
D. All switches in an MST region, except distribution layer switches, should have their priority lowered from the default value 32768.
E. An MST region is a group of MST switches that appear as a single virtual bridge to adjacent CST and MST regions.
F. Enabling MST with the "spanning-tree modemst" global configuration command also enables RSTP.
相关考题
-
单项选择题
On switch R1 you issue the "udld enable" global command. What does this command accomplish? ()
A. Enables all fiber-optic LAN ports for Unidirectional LINK Detection (UDLD)
B. Enables all copper media LAN ports Unidirectional Link Detection (UDLD)
C. Overrides the default UDLS setting for all ports
D. Globally enables all ports on the device for Unidirectional Link Detection (UDLS)
E. None of the other alternatives apply -
单项选择题
Switch R1 has been configured with the root guard feature. What statement is true if the spanning tree enhancement Root Guard is enabled? ()
A. If BPDUs are not received on a non-designated port, the port is moved into the STP loop- inconsistent blocked state
B. IF BPDUs are received on a PortFast enabled port, the port is disabled.
C. If superior BPDUs are received on a designated port, the interface is placed into the root- inconsistent blocked state.
D. If inferior BPDUs are received on a root port, all blocked ports become alternate paths to the root bride. -
多项选择题
You are the network administrator tasked with designing a switching solution for the Company network. Which of the following statements describing trunk links are INCORRECT?()
A. The trunk link belongs to a specific VLAN.
B. Multiple trunk links are used to connect multiple end user devices.
C. A trunk link only supports native VLAN.
D. Trunk links use 802.10 to identify a VLAN.
E. The native VLAN of the trunk link is the VLAN that the trunk uses for untagged packets.
