Which of the following are the five Spanning-Tree Protocol states? (Select five.)
a. Blocking
b. Listening
c. Selecting
d. Learning
e. Forwarding
f. Disabled
g. Passing
h. Cut-through
a. Blocking
b. Listening
d. Learning
e. Forwarding
f. Disabled
You might also like to view...
What is the output of the following code?
cout << "This is a \\" << endl; a. This is a b. This is a \ c. nothing, it is a syntax error d. This is a \ endl
Some attackers might create a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim's laptop directly to the attacker's laptop. What is this type of network called?
A. wireless B. access C. link D. ad hoc
To take full advantage of SMM, Intel put forward the _______________ (APM) specification in 1992 and the _______________ (ACPI) standard in 1996.
Fill in the blank(s) with the appropriate word(s).
A computer is generating a missing NTLDR error. From the Recovery Console, which of the following commands would BEST resolve this issue?
A. FORMAT B. DISKPART C. FDISK /MBR D. FIXMBR