多項選擇題Which commands, when used together, would create an 802.1Q link?()

A. Switch(vlan)# mode trunk
B. Switch(config)# switchport access mode trunk
C. Switch(config-if)# switchport mode trunk
D. Switch(config-if)# switchport trunk encapsulation dot1q
E. Switch(config)# switchport access mode 1
F. Switch(vlan)# trunk encapsulation dot1q


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題How could a large corporation with many specialized divisions benefit from using VLANs on their networks?()

A. VLANs allow access to network services based on department, not physical location.
B. VLANs utilize packet filtering to enhance network security.
C. VLANs provide a low-latency, high bandwidth internetworking alternative.
D. VLANs provide a method of communication between IP addresses in large networks.
E. VLANs establish segmented broadcast domains in switched networks.
F. VLANs can greatly simplify adding, moving, or changing hosts on the network.

2.多項選擇題Which of the following can be an expected outcome of a VLAN?()

A. VLANs logically divide a switch into multiple, independent switches at Layer 2.
B. Trunk links can carry traffic for multiple VLANs.
C. VLAN implementation significantly increases traffic due to added trunking information.
D. VLANs can span multiple switches.
E. VLANs typically decrease the number of switches needed

3.多項選擇題What must an administrator do in order to successfully configure a VLAN trunk between two switches?()

A. Set each end of the trunk line to IEEE 802.1Q encapsulation.
B. Set the same VTP management domain name on both switches.
C. Set all ports on the two switched as access ports.
D. Configure one of the two switches as a VTP server.
E. Connect the two switches using a rollover cable.
F. Use a router to forward VTP traffic between the VLANs.

最新試題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項選擇題

Which of the following statements regarding routed and routing protocols are true?()

題型:多項選擇題

New switches have been purchased for a network upgrade. The objective for the network design emphasizes efficient, error-free transport instead of fast transport.Which switching mode should be configured on the new switches to provide error-free transport to the network? ()

題型:單項選擇題

Which characteristics are representative of a link-state routing protocol?()

題型:多項選擇題

Which statement describes the rule of split horizon?()

題型:單項選擇題

A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()

題型:單項選擇題

What is a global command?()

題型:單項選擇題

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()

題型:多項選擇題

What is the subnetwork address for a host with IP address 201.100.5.68/28?()

題型:單項選擇題

Which of the following if addresses can be assigned to host devices?()

題型:多項選擇題