11. How many VLAN IDs are available for user traffic (not counting priority tagging)? A: 4096 B: 4095 C: 4097 D: 4094 12. Which of the following is FALSE according to the Service OAM standard recommendation? A: Level 6 and 7 entities are used in a customer environment B: Level 4 and 5 entities are used between provider networks C: Level 0 through 3 are used in a provider network D: Level 3 entities are link level entities 13. Which is NOT a valid port role/port state pair in spanning tree? A: designated/forwarding B: backup/blocked C: alternate/blocked D: learning/blocked E: disabled/forwarding F: designated/blocked

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
11. How many VLAN IDs are available for user traffic (not counting priority tagging)?
A: 4096
B: 4095
C: 4097
D: 4094
12. Which of the following is FALSE according to the Service OAM standard recommendation?
A: Level 6 and 7 entities are used in a customer environment
B: Level 4 and 5 entities are used between provider networks
C: Level 0 through 3 are used in a provider network
D: Level 3 entities are link level entities
13. Which is NOT a valid port role/port state pair in spanning tree?
A: designated/forwarding
B: backup/blocked
C: alternate/blocked
D: learning/blocked
E: disabled/forwarding
F: designated/blocked
Transcribed Image Text:11. How many VLAN IDs are available for user traffic (not counting priority tagging)? A: 4096 B: 4095 C: 4097 D: 4094 12. Which of the following is FALSE according to the Service OAM standard recommendation? A: Level 6 and 7 entities are used in a customer environment B: Level 4 and 5 entities are used between provider networks C: Level 0 through 3 are used in a provider network D: Level 3 entities are link level entities 13. Which is NOT a valid port role/port state pair in spanning tree? A: designated/forwarding B: backup/blocked C: alternate/blocked D: learning/blocked E: disabled/forwarding F: designated/blocked
14. In ethernet ring protection the protected link is selected by…
A: lowest cost setting
B: highest priority setting
C: explicitly defining protection link
D: lowest link speed
15. In STP the following parameters are used directly to determine whether the port will end up as forwarding or blocked:
A: port number
B: bridge MAC address
C: cost setting
D: port priority setting
E: link speed
F: A and B
G: B and D
H: B, C and D
○ I: A, C and D
J: none of the above
Transcribed Image Text:14. In ethernet ring protection the protected link is selected by… A: lowest cost setting B: highest priority setting C: explicitly defining protection link D: lowest link speed 15. In STP the following parameters are used directly to determine whether the port will end up as forwarding or blocked: A: port number B: bridge MAC address C: cost setting D: port priority setting E: link speed F: A and B G: B and D H: B, C and D ○ I: A, C and D J: none of the above
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Follow-up Questions
Read through expert solutions to related follow-up questions below.
Follow-up Question

can i get help with the other questions?

Solution
Bartleby Expert
SEE SOLUTION
Knowledge Booster
Types of Protocols
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education