A. Rollover cable
B. Console cab le
C. Crossover cable
D. Straight-through cable
E. Serial cable
您可能感興趣的試卷
你可能感興趣的試題
A. A broadcast domain with too many hosts.
B. Full duplex operation.
C. Broadcast storms.
D. Multicasting.
E. Network Segmentation.
F. Low bandwidth.
A. A switch.
B. A router.
C. A network adapter card.
D. A hub.
E. A repeater.
The TestKing network Topology is displayed in the exhibit below
A switch has been configured for three different VLANs: VLAN 2, VLAN 3, andVLAN 4. For the purposes of communication between VLANs a router is to beadded. Host from one VLAN should be able to reach the hosts in the other VLANs.
Based on this requirement, what type of connection is acceptable between the routerand switch?()
A. 10 Mbps Ethernet
B. 56 kbps serial
C. 100 Mbps Ethernet
D. 1,544 Mbps serial
E. 1000 Mbps Ethernet
An administrator is configuring a Catalyst switch with VLAN information that must be automatically distributed to other Catalyst switches in the network.
What conditions must be met in order for the VLANs configured on this switch to be automatically configured on the other switches?()
A. The switch that will share its VLAN configuration must be in VTP server mode.
B. The switches must be in the same VTP domain.
C. The switch that will share the VLAN information must be configured as the root bridge.
D. The switches must be connected over VLAN trunks.
E. The switches must be configured to use the same STP version.
F. The switches must have VTP pruning activated.
A. By default, all defined VLANs are allowed on the trunk.
B. Each single VLAN, or VLAN range, must be specified with the switchport mode command.
C. Each single VLAN, or VLAN range, must be specified with the vtp domain command.
D. Each single VLAN, or VLAN range, must be specified with the vlan database command.
A. They increase the size of collision domains.
B. They allow logical grouping of users by function.
C. They can enhance network security,
D. The increase the size of broadcast domains while decreasing the number of the broadcast domains.
E. The increase the number of broadcast domains while decreasing the size of the broadcast domains.
F. They simplify switch administration.
A. Switch(vlan)# mode trunk
B. Switch(config)# switchport access mode trunk
C. Switch(config-if)# switchport mode trunk
D. Switch(config-if)# switchport trunk encapsulation dot1q
E. Switch(config)# switchport access mode 1
F. Switch(vlan)# trunk encapsulation dot1q
A. VLANs allow access to network services based on department, not physical location.
B. VLANs utilize packet filtering to enhance network security.
C. VLANs provide a low-latency, high bandwidth internetworking alternative.
D. VLANs provide a method of communication between IP addresses in large networks.
E. VLANs establish segmented broadcast domains in switched networks.
F. VLANs can greatly simplify adding, moving, or changing hosts on the network.
A. VLANs logically divide a switch into multiple, independent switches at Layer 2.
B. Trunk links can carry traffic for multiple VLANs.
C. VLAN implementation significantly increases traffic due to added trunking information.
D. VLANs can span multiple switches.
E. VLANs typically decrease the number of switches needed
A. Set each end of the trunk line to IEEE 802.1Q encapsulation.
B. Set the same VTP management domain name on both switches.
C. Set all ports on the two switched as access ports.
D. Configure one of the two switches as a VTP server.
E. Connect the two switches using a rollover cable.
F. Use a router to forward VTP traffic between the VLANs.
最新試題
Which of the following correctly describe steps in the OSI data encapsulation process?()
You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()
Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()
Which of the following contribute to congestion on an Ethernet network?()
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()
The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()
Which characteristics are representative of a link-state routing protocol?()
New switches have been purchased for a network upgrade. The objective for the network design emphasizes efficient, error-free transport instead of fast transport.Which switching mode should be configured on the new switches to provide error-free transport to the network? ()