A.Trunk
B.Isolated
C.Primary
D.Community
E.Promiscuous
F.None of the other alternatives apply
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. The user who is connected to interface FastEthernet 0/1 is on VLAN 10 andcannot access network resources. On the basis of the information in the exhibit, which commandsequence would correct the problem?()
A.SW1(config)# interface fastethernet 0/1 SW1(config-if)# no shut
B.SW1(config)# interface fastethernet 0/1 SW1(config-if)# switchport mode access SW1(config-if)# switchport access vlan 10
C.SW1(config)# vlan 10 SW1(config-vlan)# state active
D.SW1(config)# interface fastethernet 0/1 SW1(config-if)# switchport mode access
E.SW1(config)# vlan 10 SW1(config-vlan)# no shut
You work as a network Technician. A new workstation has consistently been unable to obtain anIP address from the DHCP server when the workstation boots. Older workstations function
normally, and the new workstation obtains an address when manually forced to renew its address.
What should be configured on the switch to allow the workstation to obtain an IP address at boot?()
A.UplinkFast on the switch port connected to the server
B.BackboneFast on the switch port connected to the server
C.PortFast on the switch port connected to the workstation
D.trunking on the switch
A.Ports in VLAN 5
B.Utilization
C.VLAN information on port 0/5
D.Filters
E.MTU and type
Refer to the exhibit. On the basis of the output generated by the show commands, which twostatements are true?()
A.All interfaces on the switch have been configured as access ports
B.Because it has not been assigned to any VLAN, interface gigabitethernet 0/1 does not appearin the show vlan output
C.Because it is configured as a trunk interface, interface gigabitethernet 0/1 does not appear inthe show vlan output
D.There are no native VLANs configured on the trunk
E.VLAN 1 will not be encapsulated with an 802.1q header
F.VLAN 2 will not be encapsulated with an 802.1q header
Refer to the exhibit. Based upon the output of show vlan on switch CAT2, what can we concludeabout interfaces Fa0/13 and Fa0/14?()
A.that interfaces Fa0/13 and Fa0/14 are in VLAN 1
B.that interfaces Fa0/13 and Fa0/14 are down
C.that interfaces Fa0/13 and Fa0/14 are trunk interfaces
D.that interfaces Fa0/13 and Fa0/14have a domain mismatch with another switch
E.that interfaces Fa0/13 and Fa0/14have a duplex mismatch with another switch
最新試題
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
cisco ios command to interface dialer 0
As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()
Network Topology Exhibit:Configuration Exhibit:NET(config)# access-list 112 deny icmp any any echo logNET(config)# access-list 112 deny imp any any redirect logNET(config)# access-list 112 deny icmp any any mask-request logNET(config)# access-list 112 permit icmp any 10.1.1.0 0.0.0.255NET(config)# interface Fa0/1NET(config-if)# ip access-group 112 inYou work as a network administrator at networkTut.com, study the exhibit carefully. Theconfiguration has been applied to router NET to mitigate the threat of certain types of ICMPbasedattacks while allowing some ICMP traffic to the corporate LAN to work. However, the configurationis incorrect. On the basis of the information in the exhibit, which configuration option wouldcorrectly configure router NET?()
Refer to the exhibit. Which two statements about the AAA configuration are true?()
Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()
IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()
Drag and drop the xDSL type on the above to the appropriate xDSL description on the below.
Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.
Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()