多项选择题

You are a senior network administrator at TestKing and your trusty junior administrator tells you that he failed his task of adding VLAN 50 to a Catalyst switch in the network. You enter in the 'show vtp status' command and get this output:
TK2# show vtp status
VTP Version :2
Configuration Revision :7
Maximum VLANs supported local :68
Number of existing VLANs :8
VTP Operating Mode :Client
VTP Domain Name :corp
VTP Pruning Mode :Disabled
VTP V2 Mode :Disabled
VTP Traps Generation :Disabled
MD5 digest :0x22 0xF3 0x1A
Configuration last modified by 172.18.22.15 at 5-28-03 1t:53:20
What commands must be issued on this switch to add VLAN 50 to the database?()

A. TK2(config-if)# switchport access vlan 50
B. TK2(vlan)# vtp server
C. TK2(config)# config-revision 20
D. TK2(config)# vlan 50 name Tech
E. TK2(vlan)# vlan 50
F. TK2(vlan)# switchport trunk vlan 50


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题

There are 2 switches in the Testking LAN, with no routers. Ports 1, 2 & 3 are assigned to VLAN 1 in switch 1 and 2 and ports 4, 5 & 6 are assigned to VLAN 2 in both switches. These two switches are connected together via a trunked link.
Which of the conditions below would verify trunk and VLAN operation?()

A. Host 1 on VLAN 1 can ping Host 2 on VLAN 1
B. Host 1 on VLAN 1 can ping Host 4 on VLAN 2
C. Host 1 on VLAN 1 can not ping Host 2 on VLAN 1
D. Host 4 on VLAN 2 can not ping Host 1 on VLAN 1
E. Host 4 on VLAN 2 can ping Host 2 on VLAN 2

3.单项选择题Which layer of the OSI reference model is responsible for ensuring reliable end-to-end delivery of data?()

A.Application
B.Presentation
C.Session
D.Transport
E.Network
F.Data-Link

4.单项选择题You download a file from an FTP site on the Internet. What is the highest layer in the OSI model used in this FTP operation?()

A. Application
B. Presentation
C. Session
D. Transport
E. Internet
F. Data Link
G. Physical

6.单项选择题You are logged into a router and with to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces?()

A. show ip links
B. show cdp neighbor
C. show cdp neighbor detail
D. show ip clients
E. show ip route
F. None of the above

7.单项选择题In the context of configuring dial-on-demand routing using ISDN, what is the purpose of the dialer-list command?()

A. to identify valid numbers for incoming calls
B. to define the type of ISDN switch at the central office
C. to specify the list of outgoing phone numbers used by the router
D. to associate a dial configuration with a physical interface
E. to define interesting traffic that will enable the link

8.单项选择题A network administrator needs to configure a router for a Frame Relay connection to a non-Cisco router. Which of the following commands will prepare the WAN interface for this connection?()

A. Router(config-if)# encapsulation frame-relay q933a
B. Router(config-if)# encapsulation frame-relay ansi
C. Router(config-if)# encapsulation frame-relay ietf
D. Router(config-if)# encapsulation frame-relay isl
E. None of the above

9.多项选择题Which statements are true about EIGRP successor routes?()

A. A successor route is used by EIGRP to forward traffic to a destination.
B. Successor routes are saved in the topology table to be used if the primary route fails.
C. Successor routes are flagged as "active" in the routing table.
D. A successor route may be backed up by a feasible successor route.
E. Successor routes are stored in the neighbor table following the discovery process.
F. Successors are not used in EIGRP.

10.单项选择题You are troubleshooting a frame relay connection and wish to view the LMI traffic stats. Which command should you issue?()

A. Show interface lmi
B. Show frame-relay lmi
C. Show interface frame-relay
D. Debug frame-relay interface.

最新试题

Which statement describes the rule of split horizon?()

题型:单项选择题

Which of the following contribute to congestion on an Ethernet network?()

题型:多项选择题

What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()

题型:单项选择题

Which of the following correctly describe steps in the OSI data encapsulation process?()

题型:多项选择题

Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()

题型:多项选择题

Which characteristics are representative of a link-state routing protocol?()

题型:多项选择题

New switches have been purchased for a network upgrade. The objective for the network design emphasizes efficient, error-free transport instead of fast transport.Which switching mode should be configured on the new switches to provide error-free transport to the network? ()

题型:单项选择题

An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()

题型:多项选择题

Which command is used to display the placement and direction of an IP access control list on a router?()

题型:单项选择题

A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()

题型:多项选择题