The BID is made up of the bridge priority value(two bytes) and bridge MAC address (six bytes).
The BID is made up of the bridge priority (four bits), the system ID (12 bits), and a bridge MAC address (48 bits).
The BID is made up of the system ID (six bytes) and bridge priority value (two bytes).
The system ID value is the VLAN ID (VID).
The system ID value is a unique MAC address allocated from a pool of MAC addresses assigned to the switch or module.
The system ID value is a hex number used to measure the preference of a bridge in the spanning-tree algorithm.
第1题:
A. Traffic is permitted from the trust zone to the untrust zone.
B. Intrazone traffic in the trust zone is permitted.
C. All traffic through the device is denied.
D. The policy is matched only when no other matching policies are found.
第2题:
Which two statements are true when the extended system ID feature is enabled? ()
第3题:
A. It bypasses the OS file system cache.
B. A separate NFS interface is required for use across Linux, UNIX, and Windows platforms.
C. It uses the operating system kernel NFS layer for user tasks and network communication modules.
D. File systems need not be mounted by the kernel NFS system when being served through Direct NFS.
E. Oracle Disk Manager can manage NFS on its own, without using the operating system kernel NFS driver.
第4题:
You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()
第5题:
Which two statements are true about the rescue configuration file?()
第6题:
A. The default OSPF domain-id is 127.0.0.1.
B. In most cases, a domain-id must be configured.
C. In most cases, you do not need to configure a domain-id.
D. For a layer 3 VPN connecting multiple OSPF domains, configuring a domain-id can help control LSA translations.
第7题:
Which statements is true about Predictive Failure Analysis (PFA) for System x servers?()
第8题:
A. It must include a root password.
B. It is rollback file number 50, and you can recover it by issuing rollback 50.
C. It is created by issuing request system configuration rescue save.
D. It is updated automatically when you commit.
第9题:
Which two statements about IS reachability TLV (TLV 2) and the extended IS reachability (TLV 22) are true?()
第10题:
Which of the following statements are true?()