單項(xiàng)選擇題

Refer to the exhibit. 
What problem is preventing users on VLAN 100 from pinging addresses on VLAN 200?()

A.No default route on DLS1.
B.Encapsulation mismatch between switches.
C.Native VLAN mismatch.
D.Subinterfaces should be created on Fa0/7 and Fa0/8 on DLS1.
E.Trunking needs to be enabled.
F.The ip routing command is missing on DLS1.


您可能感興趣的試卷

你可能感興趣的試題

2.多項(xiàng)選擇題

Your boss, Miss ,is interested in CEF.
 What should you tell her? ()

A.The FIB lookup is based on the Layer 3 destination address prefix (shortest match).
B.The adjacent table is derived from the ARP table.
C.The FIB table is derived from the IP routing table.
D.When the adjacency table is full, a CEF TCAM table entry points to the Layer 3 engine to redirect the adjacency.
E.CEF IP destination prefixes are stored in the TCAM table, from the least specific to the most specific entry.
F.When the CEF TCAM table is full, packets are dropped.

3.單項(xiàng)選擇題

Refer to the exhibit. DHCP snooping is enabled for selected VLANs to provide security on the network. 
How do the switch ports handle the DHCP messages?()

A.Ports Fa2/1 and Fa2/2 source DHCP requests only. Port Fa3/1 is eligible to source all DHCP messages and respond to DHCP requests.
B.Ports Fa2/1 and Fa2/2 respond to DHCP requests only. Port Fa3/1 is eligible to source all DHCP messages.
C.Ports Fa2/1 and Fa2/2 are eligible to source all DHCP messages and respond to DHCP requests. Port Fa3/1 can source DHCP request only.
D.All three ports, Fa2/1, Fa2/2, and Fa3/1, are eligible to source all DHCP messages and respond to DHCP requests.

4.單項(xiàng)選擇題

Exhibit:

You work as a network administrator at. You study the exhibit carefully. 
Which configuration on the HSRP neighboring device ensures that it becomes the active HSRP device in the event that port fa1/1 on 1 goes down? ()

A.  2(config-if)#ip address 10.10.10.2 255.255.255.0   2(config-if)#standby 1 priority 200   2(config-if)#standby 1 ip 10.10.10.10
B.  2(config-if)# ip address 10.10.10.2 255.255.255.0   2(config-if)#standby 1 priority 195   2(config-if)#standby 1 preempt   2(config-if)#standby 1 ip 10.10.10.10
C.  2(config-if)# ip address 10.10.10.2 255.255.255.0   2(config-if)#standby 1 priority 190   2(config-if)#standby 1 ip 10.10.10.10   2(config-if)#standby 1 track interface fa 1/1
D.  2(config-if)# ip address 10.10.10.2 255.255.255.0   2(config-if)#standby 1 priority 200   2(config-if)#standby 1 preempt   2(config-if)#standby 1 ip 10.10.10.10   2(config-if)#standby 1 track interface fa 1/1

5.單項(xiàng)選擇題

You have configured the "config network webmode enable" command on a Cisco device. 
What is the purpose of this command? ()

A.To allow HTTP access to the WLAN controller
B.To allow SSH access to the CLI of the WLAN controller
C.To allow SSL access to the CLI of the WLAN controller
D.To allow HTTPS access to the WLAN controller
E.None of the other alternatives apply

6.單項(xiàng)選擇題Which statement is true about voice VLANs? ()

A.When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.
B.The voice VLAN feature is enabled by default.
C.The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.
D.The default CoS value is 1 for incoming voice and data traffic.

7.單項(xiàng)選擇題

You work as a network engineer for. You study the exhibit carefully. 
What type of attack would be mitigated by this configuration?()

A.CDP manipulation
B.VLAN hopping
C.MAC spoofing
D.MAC flood attack
E.ARP spoofing
F.spanning tree compromises

8.多項(xiàng)選擇題

You want to enhance the security within the LAN and prevent VLAN hopping.
 What two steps can be taken to help prevent this?()

A.Enable BPD guard
B.Disable CDP on ports where it is not necessary
C.Place unused ports in a common unrouted VLAN
D.Prevent automatic trunk configuration
E.Implement port security

9.單項(xiàng)選擇題

The network administrator has enabled BPDU guard on the LAN. 
Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()

A.BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. 
B.BPDU guard can guarantee proper selection of the root bridge.
C.BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.
D.BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.
E.None of the other alternatives apply

10.單項(xiàng)選擇題

Refer to the exhibit. 

What is the sequence of events when a VoIP call is placed from IP phone P1 to IP phone P2? ()

A.RTP traffic is exchanged between IP phone P1 and IP phone P2. IP phone P1 alerts the CCM of off-hook state. CCM instructs IP phone P1 to provide dialtone. IP phone P1 passes digits to CCM. CCM routes call to PSTN or IP phone P2.
B.CCM instructs IP phone P1 to provide dialtone. IP phone P1 alerts the CCM of off-hook state. IP phone P1 passes digits to CCM. CCM routes call to PSTN or IP phone P2. RTP traffic is exchanged between IP phone P1 and IP phone P2. 
C.CCM instructs IP phone P1 to provide dialtone.IP phone P1 alerts the CCM of off-hook state. IP phone P1 passes digits to CCM. RTP traffic is exchanged between IP phone P1 and IP phone P2. CCM routes call to PSTN or IP phone P2.
D.IP phone P1 alerts the CCM of off-hook state. CCM instructs IP phone P1 to provide dialtone. IP phone P1 passes digits to CCM. CCM routes call to PSTN or IP phone P2. RTP traffic is exchanged between IP phone P1 and IP phone P2.

最新試題

Which two statements about the various implementations of STP are true?()

題型:多項(xiàng)選擇題

Which two statements are true about BPDU port-guard and BPDU filtering?()

題型:多項(xiàng)選擇題

Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()

題型:?jiǎn)雾?xiàng)選擇題

What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which statement is true about the output?()

題型:?jiǎn)雾?xiàng)選擇題

Which three statements about STP timers are true?()

題型:多項(xiàng)選擇題

Which three statements are true of the Link Aggregation Control Protocol (LACP)?()

題型:多項(xiàng)選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項(xiàng)選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

題型:?jiǎn)雾?xiàng)選擇題