A.802.1Q native VLAN frames are untagged by default.
B.802.1Q trunking ports can also be secure ports.
C.802.1Q trunks can use 10 Mb/s Ethernet interfaces.
D.802.1Q trunks require full-duplex, point-to-point connectivity.
E.802.1Q trunks should have native VLANs that are the same at both ends.
您可能感興趣的試卷
你可能感興趣的試題
How many broadcast domains are shown in the graphic assuming only the default vlan is configured on the switches?()
A.one
B.six
C.twelve
D.two
A.transparent
B.auto
C.on
D.desirable
A.PVST+reduces the CPU cycles for all the switches in the network
B.PVST+automatically selects the root bridge location,to provide optimized bandwidth usage.
C.PVST+allow the root switch location to be optimized per vlan.
D.PVST+supports Layer 3 load balancing without loops.
Refer to the exhibit. What switch proves the spanning-tree designated port role for the network segment that services the printers?()
A.Switch1
B.Switch2
C.Switch3
D.Switch4
Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()
A.Host B and the switch need to be in the same subnet.
B.The switch needs and appropriate default gateway assigned.
C.The switch interface connected to the router is down.
D.Host B need to be assigned an IP address in vlan 1.
E.The switch interfaces need the appropriate IP addresses assigned.
A.it is a layer 2 messaging protocol which maintains vlan configurations across network.
B.it includes an 8-bit field which specifies the priority of a frame.
C.it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D.it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E.it is a trunking protocol capable of carring untagged frames.
Based on the network shown in the graphic which option contains the potential networking problem and protocol or setting that can to prevent the problem?()
A.Routing loops, hold down timers
B.Switching loops, split horizon
C.Routing loops, split horizon
D.Switching loops, VTP
E.Routing loops, STP
F.Switching loops, STP
A.ping address
B.tracert address
C.traceroute address
D.arp address
A.added security
B.dedicated bandwidth
C.provides segmentation
D.allows switches to route traffic between subinterfaces
E.contains collisions
Refer to the exhibit. Which statement is true?()
A.The Fa0/11 role confirms that SwitchA is the root bridge for VLAN 20.
B.VLAN 20 is running the Per VLAN Spanning Tree Protocol.
C.The MAC address of the root bridge is 0017.596d.1580.
D.SwitchA is not the root bridge, because not all of the interface roles are designated.
最新試題
What are three benefits of GLBP?()
Which statement describes VRRP object tracking?()
What parameter can be different on ports within an EtherChannel?()
What SNMP message alerts the manager to a condition on the network?()
Which three features are added in SNMPv3 over SNMPv2? ()
Syslog was configured with a level 3 trap. Which 3 types of logs would be generated?()
What are the three things that the Netflow uses to consider the traffic to be in a same flow ?()
Which three features are added in SNMPv3 over SNMPv2 ? ()
In a GLBP network, who is responsible for the arp request?()
What command instructs the device to timestamp Syslog debug messages in milliseconds?()