-- Exhibit --user@SwitchA# show protocols mstpconfiguration-name region1;bridge-priority 16k;msti 1 {bridge-priority 16k;vlan [10 20];}msti 2 {bridge-priority 8k;vlan [30 40];}user@SwitchB# show protocols mstpconfiguration-name region1;bridge-priority 8k;msti 1 {bridge-priority 16k;vlan [10 20];}msti 2 {bridge-priority 8k;vlan [30 40 50];}-- Exhibit --Click the Exhibit button.Referring to the exhibit, a customer observes that the MSTP instance between SwitchA and SwitchB is not converging correctly.What is causing the problem?
Your company makes extensive use of VSTP in your network for loop protection. The network is at the VSTP VLAN limit and must protect additional VLANs.Which command allows you to protect additional VLANs?
You are asked to set up 802.1X port authentication for all access ports on your EX Series switch. You must ensure that only one user is allowed to authenticate per port and all other attempts are denied.Which supplicant mode must be used?
You are asked to set up 802.1X port authentication for all access ports on your EX Series switch. You have a device that does not support 802.1X supplicants and you must ensure this device is authenticated. You must also ensure that no unnecessary delay occurs when authenticating this device.Which statement is correct?
Your company uses 802.1X to authenticate your users. You want to provide access to the Internet when users cannot authenticate on the RADIUS server or when the RADIUS server becomes unreachable.Which two methods accomplish this goal? (Choose two.)
Which connection method do OSPF routers use to communicate with each other?