A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
您可能感興趣的試卷
你可能感興趣的試題
A. for multiple ISDN connections
B. for modem concentrated dial-up connections
C. for a group of users in the same vicinity sharing a connection
D. for use by mobile users
A. only the low-order 23 bits of the MAC address are used to map IP addresses
B. only the low-order 24 bits of the MAC address are used to map IP addresses
C. only the high-order 23 bits of the MAC address are used to map IP addresses
D. only the low-order 23 bits of the IP address are used to map MAC addresses
E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses
A.OSPF
B.EIGRP
C.IS-IS
D.BGP
A. Easy VPN
B. GRE tunneling
C. Virtual Tunnel Interfaces
D. DynamicMultipoint VPN
E. Group Encrypted Transport VPN
A.RFP
B.RFC
C.SLC/SLA
D.SOW
A. ensure a loop-free topology
B. protect against user-side loops
C. support business applications
D. risk of lost connectivity without STP
A. 19 (3 from the warehouse range and 16 from a separate Class C address)
B. 19 (3 from the warehouse block, 15 from a separate Class C block and 1 from the IP WAN block)
C. 20 (4 from the warehouse range,15 from a separate Class C block and 1 from the IP WAN block)
D. 16 (3 from the warehouse range and 13 from a separate Class C address)
A.6
B.7
C.10
D.19
A.2500
B.3000
C.5000
D.6500
A. another name for a firewall deployed in routed mode
B. another name for a firewall deployed in transparent mode
C. a separation of multiple firewall security contexts on a single firewall
D. a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
最新試題
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
What is the recommended practice when considering VPN termination and firewall placement?()
Which of the following is the primary consideration to scale VPNs?()
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
Which technology allows centralized storage services to be shared across different VSANs?()
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()
In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()