A.IPSec VPN
B.SSL VPN
C.port security
D.port security with statically configured MAC addresses
E.private VLANs
您可能感興趣的試卷
你可能感興趣的試題
A. Make HSRP track interfaces between the edge and core routers.
B. Replace HSRP with GLBP. 用GLBP替換HSRP
C. Add crossed intrasite links: R1-R4, R2-R3, R5-R8, and R6-R7.
D. Make R3 and R8 have lower HSRP priority than R1 and R7.
E. Replace HSRP with VRRP
A.root guard
B.loop guard
C.BPDU guard
D.UDLD
E.BPDU skew detection
A. Because Frame Relay IETF encapsulation is only configurable at interface level, you must use IETF encapsulation on all routers.
B. This is not a possible scenario. A dedicated Frame Relay link to RemoteB is mandatory at the central office.
C. The router at RemoteB must be replaced by a Cisco router.
D. Use Frame Relay IETF encapsulation on a per-VC basis on the central office router.
E. There is a problem in the Frame Relay cloud, because Cisco routers are compatible with IETF Frame Relay.
A.ip verify unicast source reachable-via any
B.ip verify unicast reverse-path
C.ip verify unicast reverse-path loose
D.ip verify unicast reverse-path strict
A. Because the configuration revision of the new switches is lower than the rest of the network,it can change the VLAN database of the other switches.
B. As a VTP server, the new switch deleted all VLANs of the network.
C. Erasing VLANs increases the VTP configuration revision.
D. Since the configuration revision of the network is higher than the new switch,the VLAN database was automatically synchronized.
Refer to the exhibit. Users from the Engineering VLAN complain that every time Business VLAN users have a network connectivity issue, the Engineering VLAN users usually have problems experiencing slow response or network connectivity problems. After troubleshooting, an unauthorized switch 2 was found. This unauthorized switch has been a regular problem, assuming the root bridge function under the spanning-tree domain and causing the
Engineering VLAN to be unstable. Which three of these actions could be suggested to fix the problem?()
A. Upgrade Spanning Tree Protocol to Rapid Spanning Tree Protocol.
B. Change Business VLAN PCs to switch 1 and switch 4.
C. Force the root bridge to be switch 2, instead.
D. Adjust spanning-tree timers (max-age and forward-delay).
E. Shut down all unused ports.
F. Use MSTP to separate the Engineering VLAN from the Business VLAN to optimize spanning-tree convergence time within each VLAN
A.Binding should be manually configured.
B.It is not supported if IEEE 802.1x port-based authentication is enabled.
C.The DHCP server must support option 82, or the client is not assigned an IP address.
D.It filters based on source IP address only.
Refer to exhibits 1 and 2. In exhibit 1, all users on the LAN segment use router A as the active HSRP router. Router B is the standby router for the HSRP. In exhibit 2, the network management team reported that there is no utilization on the WAN link B. To solve this problem, you decide to change the logical topology of your LAN, but you are not sure about what changes must be made. You must manage HSRP or change it to another protocol in order to provide the most scalable design, automatic redundancy, and load balancing. Which one of these actions would be the best choice? ()
A. Use MHSRP, with three users using router A as the default gateway and three users using router B as the default gateway.
B. Keep HSRP and activate PBR to redirect half of the traffic to the other WAN link.
C. Use the backup interface on the WAN link B to provide load balancing for all users.
D. Use GLBP instead, because it provides you with up to three MAC addresses for the same default gateway virtual IP address.
E. Use GLBP instead, because it provides you with up to four MAC addresses for the same default gateway virtual IP address.
A.SMTP
B.ICMP
C.BGP
D.SSH
E.RTP
F.BitTorrent
G.VTP
Refer to the exhibit. The Layer 2 network uses VTP to manage its VLAN database. A network designer created all VLANs on the VTP server (switch 1) and it has been advertised through VTP to all other VTP clients (switches 2 through 4). Due to network growth, a network operator decided to add a new switch between switch 1 and switch 3. The network operator has been instructed to use a refurbished switch and use a VTP client. Which three of these factors should the network operator consider to minimize the impact of adding a new switch?()
A. Pay special attention to the VTP revision number, because the higher value takes the priority.
B. Configure all VLANs manually on the new switch in order to avoid connectivity issues.
C. A trunk should be established between the new switch and switches 1 and 3 as VTP only runs over trunk links.
D. Set at least the VTP domain name and password to get the new switch synchronized.
E. An ISL trunk should be established between the new switch and switches 1 and 3, because VTP only runs over ISL.
F. Pay special attention to the VTP revision number, because the lower value takes the priority.
最新試題
On the basis of the network provided in the exhibit, all routers are configured to run EIGRP on all links. If the link between PG-R1 and PG-R2 fails, what is the maximum number of queries PG-R3 will receive for 192.168.1.0/24, assuming that all the packets sent during convergence are transmitted once (there are no dropped or retransmitted packets)?()
Which multicast address is reserved for cisco-rp-discovery?()
What is the command to configure RSVP to reserve up to one-tenth of a Gigabit link,but only allow eachindividual flow to use 1 MB/s?()
Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()
The classic Spanning Tree Protocol (802.1 D 1998) uses which sequence of variables to determine thebest received BPDU?()
When STP UplinkFast is enabled on a switch utilizing the default bridge priority, what will the new bridgepriority be changed to?()
Which two are differences between IGMPv2 and IGMPv3 reports?()
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()
Choose two commands that are required to enable multicast on a router, when it is known that thereceivers use a specific functionality of IGMPv3.()
Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correctBGP session endpoint addresses and the correct BGP session hop-count limit EBGP multihop. What is agood first test to see if BGP will work across the firewall?()