單項(xiàng)選擇題You are configuring an 802.1Q trunk between a Layer 2 switch and a firewall. You read in the documentation that the best way to set up a trunk is to set the port as dynamic desirable. The trunk is not coming up. Which one of these options would be a valid explanation? ()

A.The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode ON
B.The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode to OFF
C.The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode asauto.
D.The firewall does not support DTP. You should set the switchport trunk mode to ON


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two of the following are considered valid router IDs for EIGRPv6? ()

A.0.0.0.1
B.0.255.0.1
C.2001:DB8::1
D.2001:DB8:ABCD:FEEF::1

3.多項(xiàng)選擇題Which two statements best describe spanning-tree BPDU processing for a blocking port?()

A.BPDUs that enter a blocking port are discarded.
B.BPDUs that enter a blocking port are processed.
C.Loopguard puts an interface into a loop-inconsistent state when BPDUs stop being received on a blocking port.
D.BPDUs are only processed on forwarding ports.

4.多項(xiàng)選擇題Which two statements best describe CBWFQ?()

A.The CBWFQ scheduler provides a guaranteed minimum amount of bandwidth to each class.
B.CBWFQ services each class queue using a strict priority scheduler.
C.The class-default queue only supports WFQ.
D.Inside a class queue, processing is always FIFO, except for the class-default queue.

5.多項(xiàng)選擇題Which two statements are true about the role of split horizon?()

A.It is a function used by routing protocols to install routes into routing table
B.It is a function that prevents the advertising of routes over an interface that the router is usingto reach a route
C.Its function is to help avoid routing loops.
D.It is a redistribution technique used by routing protocols

最新試題

What are the "bound IP addresses" used for in LDP?()

題型:單項(xiàng)選擇題

Which IOS security feature is configured by the ip inspect inspection-name {in  out} command?()

題型:單項(xiàng)選擇題

Which message type is constructed and sent from an MSDP router to its MSDP peers when it  receives a PIM register message (knowing that the MSDP router is also configured as an RP for  the PIM domain)?()

題型:單項(xiàng)選擇題

An administrator of a peer-to-peer server application reports that the maximum bandwidth that his application receives is 90 Mb/s. You have an 8-port,100-Mb/s EtherChannel bundle on the switching infrastructure between the two servers, resulting in a bidirectional throughput of more than what is recorded. Which two solutions would allow for more bandwidth for the application?()

題型:多項(xiàng)選擇題

For the following protocols, which one provides a mechanism to transparently intercept and redirect CIFS traffic from a client to a local Cisco Wida Area Application engine?()

題型:單項(xiàng)選擇題

Which router is doing LSA type 7 to type 5 translation,and why?()

題型:單項(xiàng)選擇題

In GLBP, which router will answer on client ARP requests?()

題型:單項(xiàng)選擇題

For the following items,what is the mathematical relationship between the committed information  rate (CIR), committed burst (Bc), and committed rate measurement interval (Tc)?()

題型:單項(xiàng)選擇題

Which one of the following potential issues is eliminated by using split horizon?()

題型:單項(xiàng)選擇題

What is the STP root guard feature designed to prevent?()

題型:單項(xiàng)選擇題