A. A command that can be entered in any configuration mode.
B. A command that supports all protocols.
C. A command that is implemented in all IOS versions.
D. A command that is set once and affects the entire router.
E. A command that is available in every release of IOS.
您可能感興趣的試卷
你可能感興趣的試題
A. >
B. #
C. ?
D. *
E. All of the above
F. None of the above
A. Defines the network topology
B. Access to network resources
C. Routing and switching functions
D. Content Filtering
E. Intrusion Detection
A. show boot
B. show flash
C. show register
D. show version
E. show config
You are the administrator of the Testking network and you have forgotten the password to one of your routers. After completing the password recovery procedure the router returned to its normal operation. The config-register was set back to the initial default value.
What is this value?()
A. 0x2112
B. 0x2104
C. 0x2102
D. 0x2142
E. 0x2100
A new switch is installed in the Testking network. This switch is to be configured sothat VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network.
Which of the conditions below have to be met in order for this to occur?()
A. The switch that will share the VLAN information must be in the VTP Server mode.
B. The switches must be in the same VTP domain.
C. The switch that will share the VLAN information must be configured as the root bridge.
D. The switches must be configured to use the same VTP version.
E. The switches must be configured to use the same STP version.
F. The switches must be configured to use the same type of ID tagging.
G. The switches must be connected over VLAN trunks.
A. 802.1q forwarding
B. VTP transparent mode
C. Cut-through
D. Store-and-forward
E. Fragment-free
F. Frame-filtering
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
A. The additions will create more collision domains.
B. IP address utilization will be more efficient.
C. More bandwidth will be required than was needed previously.
D. An additional broadcast domain will be created.
E. The possibility that switching loops will occur will increase dramatically.
A. To prevent unauthorized Telnet access to a switch port.
B. To limit the number of Layer 2 broadcasts on a particular switch port.
C. To prevent unauthorized hosts from accessing the LAN.
D. To protect the IP and MAC address of the switch and associated ports.
E. To block unauthorized access to the switch management interfaces over common TCP ports.
A. All defined VLANs are allowed on the trunk by default.
B. Each VLAN, or VLAN range, that is specified with the switchport mode command.
C. Each VLAN, or VLAN range, that is specified with the vtp domain command.
D. Each VLAN, or VLAN range, that is specified with the vlan database command.
最新試題
Which of the following contribute to congestion on an Ethernet network?()
New switches have been purchased for a network upgrade. The objective for the network design emphasizes efficient, error-free transport instead of fast transport.Which switching mode should be configured on the new switches to provide error-free transport to the network? ()
Which of the following host addresses are member of networks that can be routed across the public Internet? ()
A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()
All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()
What feature of a networks switch allows an administrative to create separate broadcast domains?()
What should the configuration register value be after successfully completing the password recover procedure and returning the router to normal operation? ()
A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()
Which of the following correctly describe steps in the OSI data encapsulation process?()
The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()