多项选择题A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?()

A. Erase flash.
B. Restart the switch.
C. Delete the VLAN database.
D. Erase the running configuration.
E. Erase the startup configuration.
F. Modify the configuration register.


您可能感兴趣的试卷

你可能感兴趣的试题

2.多项选择题What are two results of entering the Switch(config)# vtp mode client command on a Catalyst switch?()

A. The switch will ignore VTP summary advertisements.
B. The switch will forward VTP summary advertisements.
C. The switch will process VTP summary advertisements.
D. The switch will originate VTP summary advertisements.
E. The switch will create, modify and delete VLANs for the entire VTP domain.

3.多项选择题What are three valid reasons to assign ports to VLANs on a switch?()

A. to make VTP easier to implement
B. to isolate broadcast traffic
C. to increase the size of the collision domain
D. to allow more devices to connect to the network
E. to logically group hosts according to function
F. to increase network security

5.多项选择题What are the possible trunking modes for a switch port?()

A. transparent
B. auto
C. on
D. desirable
E. client
F. forwarding

6.多项选择题What should be done prior to backing up an IOS image to a TFTP server?()

A. Make sure that the server can be reached across the network.
B. Check that authentication for TFTP access to the server is set.
C. Assure that the network server has adequate space for the IOS image.
D. Verify file naming and path requirements.
E. Make sure that the server can store binary files.
F. Adjust the TCP window size to speed up the transfer.

7.多项选择题The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()

A. Switch1(config-if)# switchport port-security maximum 1
B. Switch1(config)# mac-address-table secure
C. Switch1(config)# access-list 10 permit ip host
D. Switch1(config-if)# switchport p ort-security violation shutdown
E. Switch1(config-if)# ip access-group 10

8.多项选择题Which of the following describe private IP addresses?()

A. addresses chosen by a company to communicate with the Internet
B. addresses that cannot be routed through the public Internet
C. addresses that can be routed through the public Internet
D. a scheme to conserve public addresses
E. addresses licensed to enterprises or ISPs by an Internet registry organization

9.多项选择题Which statements are true about EIGRP successor routes?()

A. A successor route is used by EIGRP to forward traffic to a destination.
B. Successor routes are saved in the topology table to be used if the primary route fails.
C. Successor routes are flagged as "active" in the routing table.
D. A successor route may be backed up by a feasible successor route.
E. Successor routes are stored in the neighbor table following the discovery process.

10.多项选择题

Which routing protocols can be used within the enterprise network shown in the diagram?()

A.RIP v1
B.RIP v2
C.IGRP
D.OSPF
E.BGP
F.EIGRP

最新试题

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()

题型:单项选择题

Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()

题型:单项选择题

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

题型:单项选择题

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

题型:单项选择题

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

题型:单项选择题

An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()

题型:单项选择题

Which statement is true, as relates to classful or classless routing?()

题型:单项选择题

What is the purpose of the cisco Vlan Trunking protocol?()

题型:单项选择题

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

题型:单项选择题

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

题型:单项选择题