多項選擇題

Inter-VLAN routing has been implemented in the Company network. In VLAN routing, 
what are  some of the disadvantages of designing a router-on-stick configuration? ()

A. InterVLAN routing cannot be filtered by the router.
B. The router becomes a single point of failure for the network.
C. Routers will not route STP BPDUs.
D. There is a possibility of inadequate bandwidth for each VLAN.
E. Additional overhead on the router can occur.
F. NetFlow Switching is required for InterVLAN accounting.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

The Company network needs to pass traffic between VLANs. 
Which device should be used to  accomplish this? ()

A. Hub
B. Switch
C. Router
D. Bridge
E. None of the other alternatives apply

2.單項選擇題

pany has implemented numerous multilayer switches that utilize FIB tables. 
Which statement  is true about the Forward Information Base (FIB) table?()

A. The FIB is derived from the IP routing table and is optimized for maximum lookup throughput.  
B. The FIB table is derived from the Address Resolution Protocol table, and it contains Layer 2  rewrite (MAC) information for the next hop.
C. When the FIB table is full, a wildcard entry redirects traffic to the Layer 3 engine.
D. The FIB lookup is based on the Layer 2 destination MAC address.
E. None of the other alternatives apply

3.單項選擇題

Refer to the exhibit. 
What type of attack is being defended against? ()

A. snooping attack
B. rogue device attack
C. STP attack
D. VLAN attack
E. spoofing attack
F. MAC flooding attack

4.單項選擇題

Refer to the exhibit. 
What will happen to traffic within VLAN 14 with a source address of  172.16.10.5?()

A. The traffic will be forwarded to the router processor for further processing.
B. The traffic will be dropped.
C. The traffic will be forwarded to the TCAM for further processing.
D. The traffic will be forwarded without further processing.

5.單項選擇題

Refer to the exhibit. 
What will happen when one more user is connected to interface FastEthernet  5/1?()

A. The first address learned on the port will be removed from the secure address list and be  replaced with the new address.
B. All secure addresses will age out and be removed from the secure address list. This will cause  the security violation counter to increment.
C. The packets with the new source addresses will be dropped until a sufficient number of secure  MAC addresses are removed from the secure address list.
D. The interface will be placed into the error-disabled state immediately, and an SNMP trap  notification will be sent.

6.多項選擇題

Refer to the exhibit. The show port-security interface fa0/1 command was issued on switch SW1.  Given the output that was generated,
 which two security statement are true? ()

A. Interface FastEthernet 0/1 was configured with the switchport port-security aging command.  
B. Interface FastEthernet 0/1 was configured with the switchport port-security protect command.  
C. Interface FastEthernet 0/1 was configured with the switchport port-security violation restrict  command.
D. When the number of secure IP addresses reaches 10, the interface will immediately shut down. 
E. When the number of secure MAC addresses reaches 10, the interface will immediately shut  down and an SNMP trap notification will be sent.

7.單項選擇題

Switch R1 has been configured with Private VLANs.
 With that type of PVLAN port should the default gateway be configured?()

A. Trunk
B. Isolated
C. Primary
D. Community
E. Promiscuous
F. None of the other alternatives apply

8.多項選擇題

What is true about access control on bridged and routed VLAN traffic? ()

A. Router ACLs can be applied to the input and output directions of a VLAN interface.
B. Bridged ACLs can be applied to the input and output directions of a VLAN interface.
C. Only router ACLs can be applied to a VLAN interface.
D. VLAN maps and router ACLs can be used in combination.
E. VLAN maps can be applied to a VLAN interface

9.單項選擇題

On a Company switch named R1 you configure the following:  iparp inspection vlan 10-12, 15  
What is the purpose of this global configuration command made on R1?()

A. Discards ARP packets with invalid IP-to-MAC address bindings on trusted ports
B. Validates outgoing ARP requests for interfaces configured on VLAN 10, 11, 12, or 15
C. Intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings
D. Intercepts all ARP requests and responses on trusted ports
E. None of the other alternatives apply

10.多項選擇題

As the network technician at Company, you need to configure DHCP snooping on a new switch. 
 Which three steps are required? ()

A. Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded  DHCP request messages.
B. Configure DHCP snooping globally.
C. Configure the switch as a DHCP server.
D. Configure DHCP snooping on an interface.
E. Configure all interfaces as DHCP snooping trusted interfaces.
F. Configure DHCP snooping on a VLAN or range of VLANs.

最新試題

Refer to the exhibit. For what purpose is the command show ip cef used?()

題型:單項選擇題

Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()

題型:多項選擇題

Which statement is correct about RSTP port roles?()

題型:單項選擇題

What is the configured priority value of the Vlan105’s group on DS2 ?()

題型:單項選擇題

Refer to the exhibit. On the basis of the output of the show spanning-tree inconsistentports command, which statement about interfaces FastEthernet 0/1 and FastEthernet 0/2 is true?()

題型:單項選擇題

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()

題型:單項選擇題

Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()

題型:單項選擇題

Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()

題型:單項選擇題

What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()

題型:單項選擇題

Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()

題型:單項選擇題