Information Technology Reference
In-Depth Information
What are the functions of a transparent bridge?
29
a. Disabled, listening, learning, filtering, forwarding
b. Learn, filter, and forward
c. Listen, learn, filter, block, and forward
d. Enabled, listen, forward, flood
Which Layer-2 protocol changes blocked interfaces to the forwarding state in the case of
bridge failure?
30
a. HSRP
b. VTP
c. STP
d. EIGRP
What is the path cost in STP?
31
a. Sum of segment costs to reach the root bridge
b. OSPF interface costs for the STP algorithm
c. The cost of Gigabit Ethernet is 1000
d. None of the above
Which access list denies Ethernet type 0x6006?
32
a.
access-list 101 deny ipv2 any any 0x6006 eq type
access-list 101 permit ip any any
b.
access-list 700 deny 0x6006 0x0000
access-list 700 permit 0x0000 0xffff
c.
access-list 200 deny 0x6006 0x0000
access-list 200 permit 0x0000 0xffff
d.
access-list 200 deny 0x6006 any eq type
access-list 200 permit any any eq type
Search WWH ::




Custom Search