多项选择题A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration?()

A. A switch in the VTP client mode cannot update its local VLAN database.
B. A trunk link must be configured between the switches to forward VTP updates.
C. A switch in the VTP server mode can update a switch in the VTP transparent mode.
D. A switch in the VTP transparent mode will forward updates that it receives to other switches.
E. A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number.
F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information?()

A. the amount of available ROM
B. the amount of available flash and RAM memory
C. the version of the bootstrap software present on the router
D. show version
E. show processes
F. show running-config

2.多项选择题What can be done to secure the virtual terminal interfaces on a router?()

A. Administratively shut down the interface.
B. Physically secure the interface.
C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D. Configure a virtual terminal password and login process.
E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

3.多项选择题Which of the following IP addresses can be assigned to the host devices?()

A.205.7.8.32/27
B.191.168.10.2/23
C.127.0.0.1
D.224.0.0.10
E.203.123.45.47/28
F.10.10.0.0/13

4.多项选择题Identify the four valid IPv6 addresses.()

A.::
B.::192:168:0:1
C.2000::
D.2001:3452:4952:2837::
E.2002:c0a8:101::42
F.2003:dead:beef:4dad:23:46:bb:101

5.多项选择题What are three IPv6 transition mechanisms?()

A. 6to4 tunneling
B. VPN tunneling
C. GRE tunneling
D. ISATAP tunneling
E. PPP tunneling
F. Teredo tunneling

6.多项选择题Which two statements are true regarding EIGRP?()

A. Passiveroutes are in the process of being calculated by DUAL.
B. EIGRP supports VLSM, route summarization, and routing update authentication.
C. EIGRP exchanges full routing table information with neighboring routers with every update.
D. If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
E. A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

7.多项选择题As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the device. For what two reasons can this happen?()

A. The data is moving from 10BASE-TX to 100BASE-TX.
B. The WAN encapsulation type has changed.
C. The data format has changed from analog to digital.
D. The source and destination hosts are in the same subnet.
E. The source and destination MAC addresses have changed.

8.多项选择题For what two purposes does the Ethernet protocol use physical addresses?()

A. to uniquely identify devices at Layer 2
B. to allow communication with devices on a different network
C. to differentiate a Layer 2 frame from a Layer 3 packet
D. to establish a priority system to determine which device gets to transmit first
E. to allow communication between different devices on the same network
F. to allow detection of a remote device when its physical address is unknown

9.多项选择题What are three characteristics of the OSPF routing protocol?()

A. It converges quickly.
B. OSPF is a classful routing protocol.
C. It uses cost to determine the best route.
D. It uses the DUAL algorithm to determine the best route.
E. OSPF routers send the complete routing table to all directly attached routers.
F. OSPF routers discover neighbors before exchanging routing information.

10.多项选择题Which three IP addresses can be assigned to hosts if the subnet mask is /27 and subnet zero is usable?()

A.10.15.32.17
B.17.15.66.128
C.66.55.128.1
D.135.1.64.34
E.129.33.192.192
F.192.168.5.63

最新试题

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

题型:单项选择题

Which command encrypts all plaintext passwords?()

题型:单项选择题

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

题型:单项选择题

Which pairing reflects a correct protocol-and-metric relationship?()

题型:单项选择题

Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()

题型:单项选择题

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

题型:单项选择题

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

题型:单项选择题

At which layer of the OSI model is RSTP used to prevent loops?()

题型:单项选择题

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

题型:单项选择题

Which IPsec security protocol should be used when confidentiality is required?()

题型:单项选择题