多項選擇題What are the possible trunking modes for a switch port?()

A. transparent
B. auto
C. on
D. desirable
E. client
F. forwarding


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題What should be done prior to backing up an IOS image to a TFTP server?()

A. Make sure that the server can be reached across the network.
B. Check that authentication for TFTP access to the server is set.
C. Assure that the network server has adequate space for the IOS image.
D. Verify file naming and path requirements.
E. Make sure that the server can store binary files.
F. Adjust the TCP window size to speed up the transfer.

2.多項選擇題The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()

A. Switch1(config-if)# switchport port-security maximum 1
B. Switch1(config)# mac-address-table secure
C. Switch1(config)# access-list 10 permit ip host
D. Switch1(config-if)# switchport p ort-security violation shutdown
E. Switch1(config-if)# ip access-group 10

3.多項選擇題Which of the following describe private IP addresses?()

A. addresses chosen by a company to communicate with the Internet
B. addresses that cannot be routed through the public Internet
C. addresses that can be routed through the public Internet
D. a scheme to conserve public addresses
E. addresses licensed to enterprises or ISPs by an Internet registry organization

4.多項選擇題Which statements are true about EIGRP successor routes?()

A. A successor route is used by EIGRP to forward traffic to a destination.
B. Successor routes are saved in the topology table to be used if the primary route fails.
C. Successor routes are flagged as "active" in the routing table.
D. A successor route may be backed up by a feasible successor route.
E. Successor routes are stored in the neighbor table following the discovery process.

最新試題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:單項選擇題

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

題型:單項選擇題

What is the purpose of the cisco Vlan Trunking protocol?()

題型:單項選擇題

On which options are standard access list based?()

題型:單項選擇題

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

題型:單項選擇題

A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0

題型:單項選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:單項選擇題

At which layer of the OSI model dose PPP perform?()

題型:單項選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項選擇題