單項選擇題

Following ticket consists of a problem description and existing configuration on the device.

Figure 1

Figure 2
Trouble Ticket Statement
Client 1 and Client 2 are getting a 169.x.x.x IP address and are not able to ping DSW1 or the FTP Server.They are able to ping each other.
Configurationon ASW1
Interface PortChannel13
switchport mode trunk
switchport trunk allowed vlan 1-9!
Interface PortChannel23
switchport mode trunk
switchport trunk allowed vlan 1-9!
Interface FastEthernet1/0/1
switchport mode access
switchport access vlan 10!
Interface FastEthernet1/0/2
switchport mode access
switchport access vlan 10!
The Fault Condition is related to which technology?()

A.VLAN
B.InterVLAN communication
C.DHCP
D.Switch to Switch Connectivity


您可能感興趣的試卷

你可能感興趣的試題

5.單項選擇題

Following ticket consists of a problem description and existing configuration on the device.

Figure 1

Figure 2
Trouble Ticket Statement
Client one is getting a 169.x.x.x IP address and is not able to ping Client 2 or DSW1. Inital troubleshootingshows that port Fa1/0/1 on ASW1 is in errdisable state.
Configurationon ASW1
Interface FastEthernet1/0/1
switchport mode access
switchport port-security
switchport port-security mac-address 0000.0000.0001
What is the solution of the fault condition?()

A.Configurationure Static IP Address on Client 1
B.Change the IP Address of VLAN 10 on DSW1
C.Issue shutdown command followed by no shutdown command on port fa1/0/1 on ASW1
D.Issue no switchport port-security mac-address 0000.0000.0001 command followed by shutdown and noshutdown command on port fa1/0/1 on ASW1
E.Issue no switchport port-security mac-address 0000.0000.0001 command on port fa1/0/1 on ASW1

最新試題

Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.

題型:問答題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:單項選擇題

Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)

題型:問答題

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

題型:單項選擇題

Drag and drop the xDSL type on the above to the appropriate xDSL description on the below.

題型:問答題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.

題型:問答題

A new router was configured with the following commands:The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()

題型:單項選擇題

Which statement correctly describes IPsec VPN backup technology?()

題型:單項選擇題

Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()

題型:單項選擇題