多项选择题

Refer to the exhibit. The Layer 2 network uses VTP to manage its VLAN database. A network designer created all VLANs on the VTP server (switch 1) and it has been advertised through VTP to all other VTP clients (switches 2 through 4). Due to network growth,a network operator decided to add a new switch between switch 1 and switch 3. The network operator has been instructed to use a refurbished switch and use a VTP client. Which three of these factors should the network operator consider to minimize the impact of adding a new switch?()

A.Pay special attention to the VTP revision number, because the higher value takes the priority.
B.Configure all VLANs manually on the new switch in order to avoid connectivity issues.
C.A trunk should be established between the new switch and switches 1 and 3 as VTP only runs over trunk links.
D.Set at least the VTP domain name and password to get the new switch synchronized.
E.An ISL trunk should be established between the new switch and switches 1 and 3,because VTP only runs over ISL.
F.Pay special attention to the VTP revision number, because the lower value takes the priority.


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题Which two of these elements need to be configured prior to enabling SSH?()

A.hostname
B.loopback address
C.default gateway
D.domain name
E.SSH peer address

2.单项选择题When troubleshooting a network, the output of the command show interfaces indicates a large number of runts. What is a runt?()

A.the number of packets that are discarded because they exceed the maximum packet size of the medium
B.errors created when the CRC generated by the originating LAN station or far-end device does not match the checksum calculated from the data received.
C.the number of packets that are discarded because they are smaller than the minimum packet size of the medium
D.the number of received packets that were ignored by the interface because the interface hardware ran low on internal buffers
E.the number of times that the interface requested another interface within the router to slow down

3.单项选择题If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()

A.ip http client secure-ciphersuite 3des-ede-cbc-sha
B.ip https max-connections 10
C.ip http timeout-policy idle 30 life 120 requests 100
D.ip http client secure-trustpoint trustpoint-name

4.单项选择题If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication,connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()

A.ip http client secure-ciphersuite 3des-ede-cbc-sha
B.ip https max-connections 10
C.ip http timeout-policy idle 30 life 120 requests 100
D.ip http client secure-trustpoint trustpoint-name

5.多项选择题When using IP SLA FTP operation,which two FTP modes are supported?()

A.Only the FTP PUT operation type is supported.
B.Active mode is supported.
C.Passive FTP transfer modes are supported.
D.FTP URL specified for the FTP GET operation is not supported.

7.单项选择题

Refer to the exhibit. Look at the command output. What can you use to prevent this behavior?()

A.UDLD
B.spanning-tree loopguard
C.VTP mode transparent
D.switchport mode desirable

10.单项选择题

Refer to the exhibit. Look at the command output. Assume that there is no other path,and the configuration is correct. What would be the consequences of this situation?()

A.Users in SW1 can ping SW2 but not vice versa.
B.Users in SW2 can ping SW1 but not vice versa.
C.Users in SW1 and SW2 can ping each other.
D.Users in SW1 and SW2 cannot ping each other.