單項選擇題What is the function of the command switchport trunk native vlan 999 on a switch?()

A. It designates VLAN 999 for untagged traffic.
B. It blocks VLAN 999 traffic from passing on the trunk.
C. It creates a VLAN 999 interface.
D. It designates VLAN 999 as the default for all unkown tagged traffic.


您可能感興趣的試卷

你可能感興趣的試題

2.單項選擇題Which command can you use to manually assign a static IPV6 address to a router interface?()

A. ipv6 address PREFIX_1::1/64
B. ipv6 autoconfig 2001:db8:2222:7272::72/64
C. ipv6 autoconfig
D. ipv6 address 2001:db8:2222:7272::72/64

3.單項選擇題Why will a switch never learn a broadcast address?()

A. Broadcast frames are never sent to swiches.
B. Broadcast addresses use an incorrect format for the switching table.
C. A broadcast address will never be the source address of a frame.
D. Broadcasts only use network layer addressing.
E. A broadcast frame is never forwarded by a switch.

4.單項選擇題Which parameter can be tuned to affect the selection of a static route as a backup.when a dynamic protocol is also being used?()

A. link bandwidth
B. hop count
C. link cost
D. administrative distance
E. link delay

5.單項選擇題VLAN 3 is not yet configured on your switch.What happens if you set the switchport access vlan 3 commmand interface configuration mode?()

A. The command is accepted and the respective VLAN is added to vlan dat.
B. The command is rejected.
C. The command is accepted and you must configure the VLAN manually.
D. The port turns amber.

6.單項選擇題The network administrator is asked to configure 113 point-to-point links.Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?()

A. 10.10.0.0/18 subnetted with mask 255.255.255.252
B. 10.10.0.0/25 subnetted with mask 255.255.255.252
C. 10.10.0.0/24 subnetted with mask 255.255.255.252
D. 10.10.0.0/23 subnetted with mask 255.255.255.252
E. 10.10.0.0/16 subnetted with mask 255.255.255.252

7.單項選擇題Which component of VPN technology ensures that data can be read only by its intended recipient?()

A. data integrity
B. encryption
C. key exchange
D. authentication

9.單項選擇題When a host transmits data across a network to another host, which process does the data go through?()

A. standardization
B. conversion
C. encapsulation
D. synchronization

10.單項選擇題A network admin wants to know every hop the packets take when he accesses cisco.com. Which command is the most appropriate to use?()

A. path cisco.com
B. debug cisco.com
C. trace cisco.com
D. traceroute cisco.com

最新試題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:單項選擇題

Which command encrypts all plaintext passwords?()

題型:單項選擇題

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()

題型:單項選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:單項選擇題

While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()

題型:單項選擇題

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()

題型:單項選擇題

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

題型:單項選擇題

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

題型:單項選擇題

If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()

題型:單項選擇題