單項(xiàng)選擇題When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link()。

A.By default, all defined VLANs are allowed on the trunk.
B.Each single VLAN, or VLAN range, must be specified with the switchport mode command.
C.Each single VLAN, or VLAN range, must be specified with the vtp domain command.
D.Each single VLAN, or VLAN range, must be specified with the vlan database command.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題What is one benefit of PVST+?()

A.PVST+reduces the CPU cycles for all the switches in the network
B.PVST+automatically selects the root bridge location,to provide optimiz…
C.PVST+allow the root switch location to be optimized per vlan.
D.PVST+supports Layer 3 load balancing without loops.

2.單項(xiàng)選擇題When a router is connected to a Frame Relay WAN link using a serial DTE interface, how is the interface clock rate determined()。

A.It is supplied by the CSU/DSU.
B.It is supplied by the far end router.
C.It is determined by the clock rate command.
D.It is supplied by the Layer 1 bit stream timing.

3.多項(xiàng)選擇題

Refer to the diagram. Which three statements describe the router port configuration and the switch port configuration as shown in the topology? ()

A.The Router1 WAN port is configured as a trunking port.
B.The Router1 port connected to Switch1 is configured using subinterfaces.
C.The Router1 port connected to Switch1 is configured as 10 Mbps.
D.The Switch1 port connected to Router1 is configured as a trunking port.
E.The Switch1 port connected to Host B is configured as an access port.
F.The Switch1 port connected to Hub1 is configured as full duplex.

4.多項(xiàng)選擇題

Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network?()

A.The subnet mask in use is 255.255.255.192.
B.The subnet mask in use is 255.255.255.128.
C.The IP address 172.16.1.25 can be assigned to hosts in VLAN1
D.The IP address 172.16.1.205 can be assigned to hosts in VLAN1
E.The LAN interface of the router is configured with one IP address.
F.The LAN interface of the router is configured with multiple IP addresses.

6.多項(xiàng)選擇題Which statements are true about EIGRP successor routes? ()

A.A successor route is used by EIGRP to forward traffic to a destination.
B.Successor routes are saved in the topology table to be used if the primary route fails.
C.Successor routes are flagged as "active" in the routing table.
D.A successor route may be backed up by a feasible successor route.
E.Successor routes are stored in the neighbor table following the discovery process.

7.單項(xiàng)選擇題What is one reason that WPA encryption is preferred over WEP()。

A.A WPA key is longer and requires more special characters than the WEP key.
B.The access point and the client are manually configured with different WPA key values.
C.WPA key values remain the same until the client configuration is changed.
D.The values of WPA keys can change dynamically while the system is used.

8.單項(xiàng)選擇題Which item represents the standard IP ACL?()

A.access-list 50 deny 192.168.1.10.0.0.255
B.access-list 110 permitip any any
C.access-list 2500 deny tcp any host 192.168.1.1eq22
D.access-list 101 deny tcp any host 192.168.1.1

9.單項(xiàng)選擇題An access list has been designed to prevent HTTP traffic from the Accounting Department from reaching the HR server attached to the Holyoke router. Which of the following access lists will accomplish this task when grouped with the e0 interface on the Chicopee router()。

A. permit ip any any deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80
B. permit ip any any deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80
C. deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80 permit ip any any
D. deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80 permit ip any any

10.多項(xiàng)選擇題

Which routing protocols can be used within the enterprise network shown in the diagram? ()

A.RIP v1
B.RIP v2
C.IGRP
D.OSPF
E.BGP
F.EIGRP

最新試題

請(qǐng)參見圖示。一臺(tái)路由器(其路由表如圖所示)收到發(fā)往192.168.1.4的數(shù)據(jù)包。路由器將如何處理該數(shù)據(jù)包?()

題型:?jiǎn)雾?xiàng)選擇題

請(qǐng)參見圖示。一臺(tái)主機(jī)正使用NAT 連接到Internet。下列哪三項(xiàng)IP 地址可實(shí)現(xiàn)此連接?()

題型:多項(xiàng)選擇題

請(qǐng)參見圖示。某用戶想要查看當(dāng)前的配置。圖中所示為ipconfig/all 命令的輸出。從此輸出可以得到哪三項(xiàng)結(jié)論?()

題型:多項(xiàng)選擇題

請(qǐng)參見圖示。已啟用路由器的NAT 功能供PC 訪問Internet??梢詾槁酚善鹘涌赟0/0/0分配下列哪一個(gè)IP 地址?()

題型:?jiǎn)雾?xiàng)選擇題

請(qǐng)參見圖示。當(dāng)計(jì)算機(jī)A 向計(jì)算機(jī)D 發(fā)送幀時(shí),哪些計(jì)算機(jī)會(huì)接收該幀?()

題型:?jiǎn)雾?xiàng)選擇題

要將數(shù)據(jù)包發(fā)送到遠(yuǎn)程網(wǎng)絡(luò),應(yīng)使用哪種設(shè)備?()

題型:?jiǎn)雾?xiàng)選擇題

請(qǐng)參見圖示。網(wǎng)絡(luò)技術(shù)人員試圖確定主機(jī)A 的正確IP 地址配置。以下哪一項(xiàng)是主機(jī)A 的有效配置?()

題型:?jiǎn)雾?xiàng)選擇題

請(qǐng)參見圖示。對(duì)于從主機(jī)A 向Web 服務(wù)器發(fā)出的網(wǎng)頁請(qǐng)求,正確的目的套接字?jǐn)?shù)字是什么?()

題型:?jiǎn)雾?xiàng)選擇題

PC 無法連接到任何遠(yuǎn)程網(wǎng)站,無法ping 通其默認(rèn)網(wǎng)關(guān),也無法ping 通本地網(wǎng)段中工作正常的打印機(jī)。以下哪項(xiàng)操作可以確認(rèn)此PC 上的TCP/IP 協(xié)議棧是否工作正常?()

題型:?jiǎn)雾?xiàng)選擇題

傳輸層如何讓主機(jī)能同時(shí)針對(duì)不同應(yīng)用程序維護(hù)多個(gè)通信流?()

題型:?jiǎn)雾?xiàng)選擇題