A.By default, all defined VLANs are allowed on the trunk.
B.Each single VLAN, or VLAN range, must be specified with the switchport mode command.
C.Each single VLAN, or VLAN range, must be specified with the vtp domain command.
D.Each single VLAN, or VLAN range, must be specified with the vlan database command.
您可能感興趣的試卷
你可能感興趣的試題
A.It is supplied by the CSU/DSU.
B.It is supplied by the far end router.
C.It is determined by the clock rate command.
D.It is supplied by the Layer 1 bit stream timing.
A.A WPA key is longer and requires more special characters than the WEP key.
B.The access point and the client are manually configured with different WPA key values.
C.WPA key values remain the same until the client configuration is changed.
D.The values of WPA keys can change dynamically while the system is used.
A.The router will use the static route.
B.The router will use the OSPF route.
C.The router will use the EIGRP route.
D.The router will load balance and use all three routes.
A.neighbor table
B.SPF table
C.RTP table
D.topology table
E.query table
F.DUAL table
A.1024
B.2046
C.4094
D.4096
E.8190
A.assigning a private IP address to the AP
B.changing the default SSID value
C.configuring a new administrator password
D.changing the mixed mode setting to single mode
E.configuring traffic filtering
A.The switch will not forward unicast frames.
B.The switch will forward the frame to a specific port.
C.The switch will return a copy of the frame out the source port.
D.The switch will remove the destination MAC from the switch table.
E.The switch will forward the frame to all ports except the port on which it was received.
A.can be used over analog circuits
B.maps Layer 2 to Layer 3 address
C.encapsulates several routed protocols
D.supports IP only
E.provides error correction
A.default gateway
B.DNS servers
C.FTP server
D.helper address
E.subnet mask
F.TFTP server
A.It sends data in clear text format.
B.It is no longer supported on Cisco network devices.
C.It is more secure than SSH
D.It requires an enterprise license in order to be implemented.
E.It requires that the destination device be configured to support Telnet connections.
最新試題
What is the purpose of the cisco Vlan Trunking protocol?()
Which command is used to display the collection of OSPF link states?()
Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()
If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()
Which command encrypts all plaintext passwords?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
Which statement is true, as relates to classful or classless routing?()
On which options are standard access list based?()