单项选择题When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?()

A. By default, all defined VLANs are allowed on the trunk.
B. Each single VLAN, or VLAN range, must be specified with the switchport mode command.
C. Each single VLAN, or VLAN range, must be specified with the vtp domain command.
D. Each single VLAN, or VLAN range, must be specified with the vlan database command.


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题Which of the following are benefits of VLANs?()

A. They increase the size of collision domains.
B. They allow logical grouping of users by function.
C. They can enhance network security,
D. The increase the size of broadcast domains while decreasing the number of the broadcast domains.
E. The increase the number of broadcast domains while decreasing the size of the broadcast domains.
F. They simplify switch administration.

2.多项选择题Which commands, when used together, would create an 802.1Q link?()

A. Switch(vlan)# mode trunk
B. Switch(config)# switchport access mode trunk
C. Switch(config-if)# switchport mode trunk
D. Switch(config-if)# switchport trunk encapsulation dot1q
E. Switch(config)# switchport access mode 1
F. Switch(vlan)# trunk encapsulation dot1q

3.多项选择题How could a large corporation with many specialized divisions benefit from using VLANs on their networks?()

A. VLANs allow access to network services based on department, not physical location.
B. VLANs utilize packet filtering to enhance network security.
C. VLANs provide a low-latency, high bandwidth internetworking alternative.
D. VLANs provide a method of communication between IP addresses in large networks.
E. VLANs establish segmented broadcast domains in switched networks.
F. VLANs can greatly simplify adding, moving, or changing hosts on the network.

4.多项选择题Which of the following can be an expected outcome of a VLAN?()

A. VLANs logically divide a switch into multiple, independent switches at Layer 2.
B. Trunk links can carry traffic for multiple VLANs.
C. VLAN implementation significantly increases traffic due to added trunking information.
D. VLANs can span multiple switches.
E. VLANs typically decrease the number of switches needed

5.多项选择题What must an administrator do in order to successfully configure a VLAN trunk between two switches?()

A. Set each end of the trunk line to IEEE 802.1Q encapsulation.
B. Set the same VTP management domain name on both switches.
C. Set all ports on the two switched as access ports.
D. Configure one of the two switches as a VTP server.
E. Connect the two switches using a rollover cable.
F. Use a router to forward VTP traffic between the VLANs.

8.多项选择题When a switch port is used as a VLAN trunk, which of the following trunk modes are valid?()

A. Blocking
B. Auto
C. Desirable
D. On
E. Transparent
F. Learning

9.多项选择题You need to create a new VLAN on your Catalyst switch. This VLAN is to be named TESTKING. Which of the following need to be completed for the creation of this new VLAN?()

A. The TESTKING VLAN must be created.
B. The desired ports must be added to the new TESTKING VLAN.
C. The TESTKING VLAN must be added to all of the domains.
D. The TESTKING VLAN must be named.
E. An IP address must be configured for the TESTKING VLAN.
F. None of the above. VLAN creations are automatic.

10.多项选择题Which encapsulation types are configurable on a Cisco switch for a trunk?()

A. VTP
B. ISL
C. CDP
D. 802.1Q
E. 802.1p
F. LLC
G. IETF

最新试题

A router with a serial interface will be used for an ISDN link.What other function group devices are required to complete the connection to the service provider? ()

题型:多项选择题

Which of the following options lists the steps in PPP session establishment in the correct order?()

题型:单项选择题

Which of the following statements regarding routed and routing protocols are true?()

题型:多项选择题

Which of the following if addresses can be assigned to host devices?()

题型:多项选择题

Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()

题型:多项选择题

All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()

题型:单项选择题

Which command is used to display the placement and direction of an IP access control list on a router?()

题型:单项选择题

What feature of a networks switch allows an administrative to create separate broadcast domains?()

题型:单项选择题

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

题型:多项选择题

Which statement describes the rule of split horizon?()

题型:单项选择题