试题-思科认证考试

试题-思科认证考试

1.What statement is FALSE with respect to the operation of Unidirectional Link Detection?   
A. It negotiates the Unidirectional Link Detection link state during physical signaling.   
B. It performs tasks that autonegotiation cannot perform.   
C. It works by exchanging protocol packets between the neighboring devices.   
D. Both devices on the link must support Unidirectional Link Detection and have it enabled on respective ports.   

2.What is true concerning Traffic contract, Traffic shaping, and Traffic policing in ATM networks?   
A. They are parameters of PNNI set during PNNI configuration.   
B. They are forms of QoS features used in ATM networks.   
C. They are types of SVCs.   
D. They are types of PVCs.   
E. They are only used between ATM switches to control traffic flows.   

3.Which are the primary reasons to use traffic shaping? (Select two)   
A. To control the maximum rate of traffic transmitted or received on an interface.   
B. To control access to available bandwidth.   
C. To define Layer 3 aggregate or granular incoming or outgoing bandwidth rate limits.   
D. To control the average queue size by indicating to the end hosts when they should temporarily slow down transmission of packets.   
E. To ensure that traffic conforms to the policies established for it.   

4.In a bridged network running IEEE 802.1d spanning tree, what parameter will a bridge take form the root bridge?   
A. Maxage   
B. Forwarding delay   
C. Hello time   
D. All of the above   

5.What statement is FALSE concerning the use of SPAN on the Catalyst 6500?   
A. It is possible to configure SPAN to have a Gigabit port, such as source port, and a 10/100 port as the destination port.   
B. If the source port is configured as a trunk port, the traffic on the destination port will be tagged as well, regardless of the configuration on the destination port.
C. When a SPAN session is active the destination port does not participate in Spanning Tree.   
D. With SPAN an entire VLAN can be configured to be the source.   
E. In one SPAN session it is possible to monitor multiple ports that do not belong to the same VLAN.

版权声明:本文内容由互联网用户自发贡献,该文观点仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容, 请发送邮件至 yyfangchan@163.com (举报时请带上具体的网址) 举报,一经查实,本站将立刻删除