In the MSTP protocol, each MST INSTANCE uses the RSTP algorithm separately to calculate a separate spanning tree.
In the MSTP protocol, each MST INSTANCE uses the RSTP algorithm separately to calculate a separate spanning tree.A . TrueB . FalseView AnswerAnswer: A
As shown in the figure below, if you want employees of department A to not communicate with each other, employees of department B can communicate with each other, but different departments cannot communicate with each other, and all employees can access the company's server through MUX VLAN. To achieve this function, which of the following statement is correct?
As shown in the figure below, if you want employees of department A to not communicate with each other, employees of department B can communicate with each other, but different departments cannot communicate with each other, and all employees can access the company's server through MUX VLAN. To achieve this...
In the network design, we can provide higher reliability for business customers through a network of redundant topology selection, which of the following topological structure can provide with redundancy? (Multiple Choice)
In the network design, we can provide higher reliability for business customers through a network of redundant topology selection, which of the following topological structure can provide with redundancy? (Multiple Choice)A . Star topologyB . Ring topologyC . Bus topologyD . Double star topologyView AnswerAnswer: BD
The network troubleshooting method belongs to which one of the following?
When troubleshooting the network, you find that there may be a problem with the OSPF configuration on a certain router, but when you log in to the network device to check the OSPF configuration, you find that the OSPF and BFD linkage configuration is also wrong, so you modify the...
In a network running STP, a variety of topology change information will be sent when the network topology changes. How many types of topology change information are defined in the RSTP network?
In a network running STP, a variety of topology change information will be sent when the network topology changes. How many types of topology change information are defined in the RSTP network?A . OneB . TwoC . ThreeD . FourView AnswerAnswer: A
Enterprises in order to improve the reliability of the interconnection of exports, often use the method of a plurality of links connecting different operators. When using this method, you need to focus on the flow path of the outgoing direction and incoming direction, or may affect the quality of the network.
Enterprises in order to improve the reliability of the interconnection of exports, often use the method of a plurality of links connecting different operators. When using this method, you need to focus on the flow path of the outgoing direction and incoming direction, or may affect the quality of the...
Which of the following different types of line interfaces is not in the same category as the others?
Which of the following different types of line interfaces is not in the same category as the others?A . BNC interfaceB . FC interfaceC . LC interfaceD . SC interfaceView AnswerAnswer: A
The OSPF vlink-peer command is used to configure a virtual connection, which specifies the router-id of the peer.
The OSPF vlink-peer command is used to configure a virtual connection, which specifies the router-id of the peer.A . TrueB . FalseView AnswerAnswer: A
In the judgment and analysis stage of the structured network troubleshooting process, as long as the failure information, maintenance information, and change information are summarized, a list of causes of network failures can be obtained.
In the judgment and analysis stage of the structured network troubleshooting process, as long as the failure information, maintenance information, and change information are summarized, a list of causes of network failures can be obtained.A . TrueB . FalseView AnswerAnswer: B
The exclusion TELNET logon failure, which is a priority step to do?
The exclusion TELNET logon failure, which is a priority step to do?A . Check whether the client can ping the serverB . Check whether the number of users logging in to the device has reached the upper limitC . Check whether ACL is configured in the VTY user interface view on the deviceD . Check whether the protocol configuration allowed for...