A. 0
B. 1
C. 10
D. 20
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust cos on the switch port that is connected to the IP phone?()
A.Effectively the trust boundary has been moved to the IP phone
B.The host is now establishing the CoS value and has effectively become the trust boundary
C.The switch is rewriting packets it receives from the IP phone and determining the CoS value
D.The switch will no longer tag incoming voice packets and will trust the distribution layer switch to set the CoS
E.RTP will be used to negotiate a CoS value based upon bandwidth utilization on the link
Refer to the exhibit. Which two statements are correct?()
A.All six routes will be installed in the routing table
B.Two routes will be installed in the routing table
C.Four routes will be installed in the routing table
D.All the routes were redistributed into BGP from an IGP
E.All the routes were originated by BGP with the network command
Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()
A. Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1.
B. No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0.
C. No. Traffic will loop back and forth between switch S5 and S2.
D. Yes. Traffic will pass from switch S6 to S3 to S2 to S1.
E. No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end.
A. LWAPP encrypts control traffic between the AP and the controller.
B. LWAPP encrypts user traffic with a x.509 certificate using AES-CCMP
C. LWAPP encrypts both control traffic and user data.
D. When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.
Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?()
A.The map prohibits the redistribution of all type 2 external OSPF routes with tag 6 set
B.The map prohibits the redistribution of all type 2 external OSPF routes
C.The map redistributes into EIGRP all routes that match the pfx prefix list and the five metric values40000, 1000, 255, 1, and 1500
D.The map prohibits the redistribution of all external OSPF routes with tag 6 set
E.All routes that do no match clauses 10 and 20 of the route map are redistributed with their tags set to 8
F.The map permits the redistribution of all type 1 external OSPF routes
Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()
A.switchport priority extend trust
B.switchport priority extend cos 2
C.switchport priority extend cos 11
D.mls qos cos 2
E.mls qos cos 2 override
A.Voice VLANs eliminate the need for QoS configuration
B.Voice VLANs are used on trunk links to eliminate the need for QoS CoS markings
C.Voice VLANs are mainly used to reduce the number of access switch ports that are used in the network
D.Voice VLANs can be configured to forward existing CoS priorities or override them
E.Voice VLANs are mainly used between access layer switches and distribution layer switches
F.Voice VLANs can be configured on Layer 2 ports only
Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()
A.Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1
B.No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0
C.No. Traffic will loop back and forth between switch S5 and S2
D.Yes. Traffic will pass from switch S6 to S3 to S2 to S1
E.No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end
Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option permits the configuration of host-based Extensible Authentication Protocol (EAP)?()
A. WPA/WPA2/CCKM
B. WPA/WPA2 Passphrase
C. 802.1x
D. Pre-Shared Key (Static WEP)
A. The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point, manage authentication to the wireless network, and enable data encryption.
B. The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.
C. The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.
D. The Aironet Desktop Utility (ADU) profile manager feature can create and manage only one profile for the wireless client adapter.
E. When the user selects a different profile in the Aironet Desktop Utility (ADU), the settings for the wireless client adapter are changed only after a reboot.
最新試題
Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is the significance of the icon?()
A client is searching for an access point (AP). What is the correct process order that the client and access point go through to create a connection?()
Which two statements about voice VLANs are correct?()
Refer to the exhibit. Which statement is true?()
Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()
Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()
Refer to the exhibit. Which statement is true about where trust boundaries should be established in a network?()
If no metric is specified for the routes being redistributed into IS-IS, what metric value is assigned to the routes?()
Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?()
Refer to the exhibit. Which two statements are correct?()