多項(xiàng)選擇題What are three valid reasons to assign ports to VLANs on a switch?()

A. to make VTP easier to implement
B. to isolate broadcast traffic
C. to increase the size of the collision domain
D. to allow more devices to connect to the network
E. to logically group hosts according to function
F. to increase network security


您可能感興趣的試卷

你可能感興趣的試題

2.多項(xiàng)選擇題What are the possible trunking modes for a switch port?()

A. transparent
B. auto
C. on
D. desirable
E. client
F. forwarding

3.多項(xiàng)選擇題What should be done prior to backing up an IOS image to a TFTP server?()

A. Make sure that the server can be reached across the network.
B. Check that authentication for TFTP access to the server is set.
C. Assure that the network server has adequate space for the IOS image.
D. Verify file naming and path requirements.
E. Make sure that the server can store binary files.
F. Adjust the TCP window size to speed up the transfer.

4.多項(xiàng)選擇題The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()

A. Switch1(config-if)# switchport port-security maximum 1
B. Switch1(config)# mac-address-table secure
C. Switch1(config)# access-list 10 permit ip host
D. Switch1(config-if)# switchport p ort-security violation shutdown
E. Switch1(config-if)# ip access-group 10

5.多項(xiàng)選擇題Which of the following describe private IP addresses?()

A. addresses chosen by a company to communicate with the Internet
B. addresses that cannot be routed through the public Internet
C. addresses that can be routed through the public Internet
D. a scheme to conserve public addresses
E. addresses licensed to enterprises or ISPs by an Internet registry organization

6.多項(xiàng)選擇題Which statements are true about EIGRP successor routes?()

A. A successor route is used by EIGRP to forward traffic to a destination.
B. Successor routes are saved in the topology table to be used if the primary route fails.
C. Successor routes are flagged as "active" in the routing table.
D. A successor route may be backed up by a feasible successor route.
E. Successor routes are stored in the neighbor table following the discovery process.

7.多項(xiàng)選擇題

Which routing protocols can be used within the enterprise network shown in the diagram?()

A.RIP v1
B.RIP v2
C.IGRP
D.OSPF
E.BGP
F.EIGRP

8.多項(xiàng)選擇題At which layers of the OSI model do WANs operate?()

A. application layer
B. session layer
C. transport layer
D. network layer
E. datalink layer
F. physical layer

10.多項(xiàng)選擇題A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()

A. Configure port Fa0/1 to accept connections only from the static IP address of the server.
B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C. Configure the MAC address of the server as a static entry associated with port Fa0/1.
D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

最新試題

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

題型:?jiǎn)雾?xiàng)選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement describes the rule of split horizon?()

題型:?jiǎn)雾?xiàng)選擇題

A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()

題型:?jiǎn)雾?xiàng)選擇題

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

題型:?jiǎn)雾?xiàng)選擇題

How are VTP advertisements delivered to switches across the network?()

題型:?jiǎn)雾?xiàng)選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:?jiǎn)雾?xiàng)選擇題

Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()

題型:?jiǎn)雾?xiàng)選擇題

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()

題型:?jiǎn)雾?xiàng)選擇題

If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()

題型:?jiǎn)雾?xiàng)選擇題