Which two statements are true when the extended system ID fe

题目
多选题
Which two statements are true when the extended system ID feature is enabled? ()
A

The BID is made up of the bridge priority value(two bytes) and bridge MAC address (six bytes).

B

The BID is made up of the bridge priority (four bits), the system ID (12 bits), and a bridge MAC address (48 bits).

C

The BID is made up of the system ID (six bytes) and bridge priority value (two bytes).

D

The system ID value is the VLAN ID (VID).

E

The system ID value is a unique MAC address allocated from a pool of MAC addresses assigned to the switch or module.

F

The system ID value is a hex number used to measure the preference of a bridge in the spanning-tree algorithm.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

A. Traffic is permitted from the trust zone to the untrust zone.

B. Intrazone traffic in the trust zone is permitted.

C. All traffic through the device is denied.

D. The policy is matched only when no other matching policies are found.


参考答案:C, D

第2题:

Which two statements are true when the extended system ID feature is enabled? ()

  • A、The BID is made up of the bridge priority value(two bytes) and bridge MAC address (six bytes).
  • B、The BID is made up of the bridge priority (four bits), the system ID (12 bits), and a bridge MAC address (48 bits).
  • C、The BID is made up of the system ID (six bytes) and bridge priority value (two bytes).
  • D、The system ID value is the VLAN ID (VID).
  • E、The system ID value is a unique MAC address allocated from a pool of MAC addresses assigned to the switch or module.
  • F、The system ID value is a hex number used to measure the preference of a bridge in the spanning-tree algorithm.

正确答案:B,D

第3题:

Which two statements about Oracle Direct Network File System (NFS) are true?()

A. It bypasses the OS file system cache.

B. A separate NFS interface is required for use across Linux, UNIX, and Windows platforms.

C. It uses the operating system kernel NFS layer for user tasks and network communication modules.

D. File systems need not be mounted by the kernel NFS system when being served through Direct NFS.

E. Oracle Disk Manager can manage NFS on its own, without using the operating system kernel NFS driver.


参考答案:A, E

第4题:

You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()

  • A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.
  • B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.
  • C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).
  • D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.
  • E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.
  • F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

正确答案:A,B,C

第5题:

Which two statements are true about the rescue configuration file?()

  • A、It gets updated automatically when you commit.
  • B、You need to create it by issuing request system configuration rescue save.
  • C、It is rollback file number 50 and you can recover it by issuing rollback 50.
  • D、You can load it by entering rollback rescue.

正确答案:B,D

第6题:

Which two statements are true when configuring a domain-id? ()

A. The default OSPF domain-id is 127.0.0.1.

B. In most cases, a domain-id must be configured.

C. In most cases, you do not need to configure a domain-id.

D. For a layer 3 VPN connecting multiple OSPF domains, configuring a domain-id can help control LSA translations.


参考答案:C, D

第7题:

Which statements is true about Predictive Failure Analysis (PFA) for System x servers?()

  • A、PFA is embedded in selected server components and requires no action for being enabled
  • B、PFA is available only when the Server Plus Pack is installed on the server
  • C、PFA is available only when a Virtual Media Key is present
  • D、PFA is available when the related setting is turned on in UEFI settings

正确答案:A

第8题:

Which two statements are true about the rescue configuration file?()

A. It must include a root password.

B. It is rollback file number 50, and you can recover it by issuing rollback 50.

C. It is created by issuing request system configuration rescue save.

D. It is updated automatically when you commit.


参考答案:A, C

第9题:

Which two statements about IS reachability TLV (TLV 2) and the extended IS reachability (TLV 22) are true?()

  • A、TLV 22 supports wide metrics.
  • B、TLV 2 is only used in Level 1 routers.
  • C、TLV 22 displays the neighbor's extended areas.
  • D、Only TLV 22 can support the inclusion of sub-TLVs.

正确答案:A,D

第10题:

Which of the following statements are true?() 

  • A、 The equals() method determines if reference values refer to the same object.
  • B、 The == operator determines if the contents and type of two separate objects match.
  • C、 The equals() method returns true only when the contents of two objects match.
  • D、 The class File overrides equals() to return true if the contents and type of two separate objects        match.

正确答案:A,D

更多相关问题