Refer to the exhibit. On the basis of the output generated by the show commands, which twostatements are true?()
A.All interfaces on the switch have been configured as access ports
B.Because it has not been assigned to any VLAN, interface gigabitethernet 0/1 does not appearin the show vlan output
C.Because it is configured as a trunk interface, interface gigabitethernet 0/1 does not appear inthe show vlan output
D.There are no native VLANs configured on the trunk
E.VLAN 1 will not be encapsulated with an 802.1q header
F.VLAN 2 will not be encapsulated with an 802.1q header
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. Based upon the output of show vlan on switch CAT2, what can we concludeabout interfaces Fa0/13 and Fa0/14?()
A.that interfaces Fa0/13 and Fa0/14 are in VLAN 1
B.that interfaces Fa0/13 and Fa0/14 are down
C.that interfaces Fa0/13 and Fa0/14 are trunk interfaces
D.that interfaces Fa0/13 and Fa0/14have a domain mismatch with another switch
E.that interfaces Fa0/13 and Fa0/14have a duplex mismatch with another switch
Refer to the show interface Gi0/1 switchport command output shown in the exhibit. Which twostatements are true about this interface?()
A.This interface is a member of a voice VLAN
B.This interface is a dot1q trunk passing all configured VLANs
C.This interface is a member of VLAN7
D.This interface is configured for access mode
E.This interface is a member of VLAN1
A.show spantree backbonefast
B.show spantree statistics
C.show spantree uplinkfast
D.show spantree blockedports
E.show spantree portstate
F.show spantree portvlancost
The network is displayed in the diagram below:
You use the following information for switch SWA:
Port Mode Encapsulation Status Native VLAN
fa0/1 desirable n-802.1q trunking 5
Port VLANs is allowed on trunk
fa0/ 1 1-100, 102-1005
Port VLANs is owned and active in management domain
fa0/1 1-6. 8-100, 102-115, 197-999, 1002-1005
Port VLANs in spanning tree forwarding state and not pruned
fa0/1 1-6, 8-100, 102-105, 108-999, 1002-1005
SW users in VLAN 107 complain that they are unable to gain access to the resources through theSW1 router.
What is the cause of this problem?()
A.VLAN 107 is not configured on the trunk
B.VLAN 107 does not exist on switch SWA
C.VTP is pruning VLAN 107
D.Spanning tree is not enabled on VLAN 107
E.None of the other alternatives apply
A.Combine all the VLAN spanning trees into a single spanning tree
B.Set forward delay and max-age timers to the maximum possible values
C.None of the choices
D.Change the router VTP server mode
E.Disable the root bridge
最新試題
Router NetworkTut is configured as shown below:Given the above configuration, which statement is true?()
This item contains several questions that you must answer. You can view these questions byclicking on the Questions button to the left. Changing questions can be accomplished by clickingthe numbers to the left of each question. In order to complete the questions, you will need to referto the SDM and the topology, neither of which is currently visible. To gain access to either thetopology or the SDK click on the button to left side of the screen that corresponds to the sectionyou wish to access. When you have finished viewing the topology the SDK you can return to yourquestions by clicking on the Questions button to the left.Which IPSec rule is used for the Olympia branch and what does it define?()
In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()
cisco ios command to interface dialer 0
Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.
Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()
Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)
This item contains several questions that you must answer. You can view these questions byclicking on the Questions button to the left. Changing questions can be accomplished by clicking the numbers to the left of each question. In order to complete the questions, you will need to referto the SDM and the topology, neither of which is currently visible.To gain access to either the topology or the SDK click on the button to left side of the screen thatcorresponds to the section you wish to access. When you have finished viewing the topology theSDK you can return to your questions by clicking on the Questions button to the left.Which defined peer IP address an local subnet belong to Crete?()