When limit-learning is configured on a port and the limit is reached the following traffic still flows to the port.
A. Packets destined for the active Mac addresses
B. Broadcast traffic
C. EDP traffic
D. All of the above
The following CLI command is valid to advertise SLB virtual servers in OSPF ith a cost of 10. Enable ospf export vip cost 10
A. True
B. False
Traffic involved with Policy based QoS is handled by the switch its CPU.
A. true
B. False
A QoS building block that defines a class of service by specifying traffic behavior attributes like bandwidth is called
A. QoS mode
B. QoS Class of Service
C. QoS Profile
D. QoS Priority
What configuration is send when you upload a configuration from a Summit 1i switch to a TFTP server
A. The primary configuration
B. The secondary configuration
C. The configuration that is active in run-time memory
D. The configuration that is last saved.
The IS-IS Routing Protocol has been developed in ISO to provide routing for pure OSI environments.
A. True
B. False
in IS-IS level 1/2 routers act as border routers to their respective areas, providing connectivity to other areas.
A. TRUE
B. FALSE
In OSPF, when you configure an Extreme switch with router priority of 0, what happens?
A. The router becomes a Backup Designated Router
B. The router becomes a Designated Router
C. The router will not participate in the DR election algorithm
D. Nothing because router priority 0 is the default setting for router priority
A TCP type ACL that uses the permit-established keyword filters out SYN packets in one direction.
A. TRUE
B. FALSE
A switch originally configured as a VRRP back-up switch has the following potential VRRP states Choose all three that apply.
A. Init
B. Back-up
C. Slave
D. Master
What does IS-IS stand for?
A. Interconnect System to Interconnect System
B. Intermediate Storage to Interconnect System
C. Intermediate System to Intermediate System
D. None of these
Radius and Tacacs+ are both access security features supported by Extreme Networks. Servers running
these two features are also known as AAA servers.
Where do these 3 A's stand for?
A. authentication, authorization, accounting
B. authentication, access, accounting
C. attribute, authorization, accounting
D. authentication, arrival, accounting
In SLB the forwarding mode is the method a switch uses to forward traffic to the virtual servers. On the Summit 7i switch four forwarding modes are supported, select the two forwarding modes that are hardware based.
A. Transparent mode
B. Translation mode
C. Port Translation mode
D. GoGo mode
What mechanism is used by IGMP to manage host groups?
A. IGMP uses a normal ARP and ARP Response mechanism.
B. IGMP uses the query-response mechanism.
C. IGMP uses manually configured Access Control Lists.
D. IGMP uses none of the above.