單項(xiàng)選擇題A new switch is installed into an existing LAN and a new VTP trunk is set up with an existing switch. Which VLANs will be allowed on this new trunk?()

A. All defined VLANs are allowed on the trunk by default.
B. Each VLAN, or VLAN range, that is specified with the switchport mode command.
C. Each VLAN, or VLAN range, that is specified with the vtp domain command.
D. Each VLAN, or VLAN range, that is specified with the vlan database command.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題

A new switch is being installed and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches.
Which of the following must you do to accomplish this?()

A. You must set each end of the trunk line to IEEE 802.1e encapsulation.
B. You must set the same VTP management domain name on both switches.
C. You must set all ports on the two switches as access ports.
D. You must configure one of the switches as a VTP server.
E. You must use a rollover cable to connect the two switches.

2.單項(xiàng)選擇題

You are bringing up a new Cisco Catalyst switch, and wish to connect it via a trunk to another switch from a different vendor, which uses the IEEE standard for the trunking method.
When setting the encapsulation type on the trunk, what should you configure on the Cisco switch?()

A. Switch(config)# switchport trunk encapsulation isl
B. Switch(config)# switchport trunk encapsulation ietf
C. Switch(config-if)# switchport trunk encapsulation isl
D. Switch(config-if)# switchport trunk encapsulation ietf
E. Switch(config-if)# switchport trunk encapsulation dot1q

3.多項(xiàng)選擇題Which of the following steps are necessary in order to add a new VLAN to a switched network?()

A. Create the VLAN.
B. Name the VLAN.
C. Configure an IP address for the VLAN.
D. Add the desired ports to the new VLAN.
E. Add the VLAN to the VTP domain.

4.多項(xiàng)選擇題Which router console commands are used to manage telnet sessions to other routers? ()

A. TestKingD# disconnect 3
B. TestKingD# exit session 2
C. TestKingD# kill connection 1
D. TestKingD# show sessions
E. TestKingD# show connection all
F. TestKingD# resume 4

5.單項(xiàng)選擇題

You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines.
What command would assign this access- list to the Virtual Terminal Lines?()

A. router(config-line)# ip access-group 1 in
B. router(config-line)# access-class 1 in
C. router(config-line)# ip access-list 1 in
D. router(config-line)# access-line 1 in

最新試題

Which command is used to display the placement and direction of an IP access control list on a router?()

題型:?jiǎn)雾?xiàng)選擇題

Which of the following statements regarding routed and routing protocols are true?()

題型:多項(xiàng)選擇題

Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()

題型:?jiǎn)雾?xiàng)選擇題

A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()

題型:多項(xiàng)選擇題

Which of the following contribute to congestion on an Ethernet network?()

題型:多項(xiàng)選擇題

The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()

題型:?jiǎn)雾?xiàng)選擇題

A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()

題型:?jiǎn)雾?xiàng)選擇題

Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()

題型:多項(xiàng)選擇題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項(xiàng)選擇題

Which of the following correctly describe steps in the OSI data encapsulation process?()

題型:多項(xiàng)選擇題