單項選擇題Which statements about 802.1Q trunking in Secure Network Foundation Design Guide for Single Site Deployments are correct?()

A.The Cisco Control VLAN carries only Layer 2 control traffic
B.802.1Q trunking is used between the access switch and the router
C.There is no 802.1Q trunking used in these designs
D.When 802.1Q trunks are configured, they are also called Native VLANs
E.Trunking Ensures that traffic from only one VLAN is carried on that trunk


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()

A.They are separate from the central site and use NAT to route through the Internet to the Central Site
B.They are part of the VLANs at the Central Site; they are in the same subnets
C.They use public IP Addresses that are routable through the Internet
D.They are in separate subnets but are part of the private address space of the network

2.多項選擇題When using Cisco Network Assistant to configure a WS-CE500-24LC switch, which three are available choices in the port settings window?()

A.Duplex mode selections
B.Auto MDIX selections
C.Status Selections
D.Group mode selections
E.Port security selections

3.單項選擇題Your Customer has 21 users, each requiring both PC and IP Phone connectivity. Which is the correct configuration for this customer?()

A.1 Cisco 2811 ISR,1 Catalyst Express 500G-12TC,2 Catalyst Express 500-24PC
B.1 Cisco 2851 ISR, Catalyst Express 500G-12TC,3 catalyst Express 500-24PC
C.1 Cisco 2821 ISR,Catalyst Express 500G-12TC,2 Catalyst Express 500-24PC
D.1 Cisco 2801 ISR,1 Catalyst Express 500-24PC

4.單項選擇題

You work as a network technician at Certkiller .com. Please study the exhibit carefully. What does "locking Down" the router entail?()

A.Disabling HTTPS access to Cisco SDM
B.Prohibiting console access to Router
C.Preventing any alterations to the router’s running configuration
D.Disabling all vulnerable Services on the Router
E.Shutting down all the router’s interfaces

最新試題

You work as a network technician at Certkiller .com. Please study the exhibit carefully. The exhibit is an example of which technology being implemented?()

題型:單項選擇題

When using Cisco Network Assistant to configure a WS-CE500-24LC switch, which three are available choices in the port settings window?()

題型:多項選擇題

Please study the exhibit.What are two options available when using the Security Audit Configuration task in Cisco SDM?()

題型:多項選擇題

You work as a network technician at Certkiller .com. Please study the exhibit carefully. Which two interfaces are enabled for 802.1Q encapsulation?()

題型:多項選擇題

When enabling IPS on an ISR using the Cisco SDM IPS Wizard, in what location can the SDF be placed?()

題型:單項選擇題

You work as a network technician at Certkiller .com. Please study the exhibit carefully. Which Cisco SDM Configuration task would you use to enable access and inspection rules on the WAN interface, preventing any external traffic from entering the network unless that traffic is a reply to a session that originated in the internal network?()

題型:單項選擇題

You work as a network technician at Certkiller .com. Your boss, Mrs. Certkiller, is interested in WAN devices. Match the appropriate WAN device with the correct description.

題型:問答題

When using the steps to success methodology, where does Quote Builder fit into the deal process flow?()

題型:單項選擇題

In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()

題型:多項選擇題

When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()

題型:多項選擇題